May 17 01:10:26.560126 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 01:10:26.560139 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 01:10:26.560147 kernel: BIOS-provided physical RAM map: May 17 01:10:26.560151 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable May 17 01:10:26.560154 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved May 17 01:10:26.560158 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved May 17 01:10:26.560163 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable May 17 01:10:26.560167 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved May 17 01:10:26.560171 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000081a70fff] usable May 17 01:10:26.560175 kernel: BIOS-e820: [mem 0x0000000081a71000-0x0000000081a71fff] ACPI NVS May 17 01:10:26.560180 kernel: BIOS-e820: [mem 0x0000000081a72000-0x0000000081a72fff] reserved May 17 01:10:26.560184 kernel: BIOS-e820: [mem 0x0000000081a73000-0x000000008afcdfff] usable May 17 01:10:26.560188 kernel: BIOS-e820: [mem 0x000000008afce000-0x000000008c0b2fff] reserved May 17 01:10:26.560192 kernel: BIOS-e820: [mem 0x000000008c0b3000-0x000000008c23bfff] usable May 17 01:10:26.560197 kernel: BIOS-e820: [mem 0x000000008c23c000-0x000000008c66dfff] ACPI NVS May 17 01:10:26.560202 kernel: BIOS-e820: [mem 0x000000008c66e000-0x000000008eefefff] reserved May 17 01:10:26.560206 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable May 17 01:10:26.560211 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved May 17 01:10:26.560215 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved May 17 01:10:26.560219 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved May 17 01:10:26.560224 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved May 17 01:10:26.560228 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved May 17 01:10:26.560232 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved May 17 01:10:26.560236 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable May 17 01:10:26.560240 kernel: NX (Execute Disable) protection: active May 17 01:10:26.560245 kernel: SMBIOS 3.2.1 present. May 17 01:10:26.560250 kernel: DMI: Supermicro PIO-519C-MR-PH004/X11SCH-F, BIOS 2.6 12/05/2024 May 17 01:10:26.560254 kernel: tsc: Detected 3400.000 MHz processor May 17 01:10:26.560259 kernel: tsc: Detected 3399.906 MHz TSC May 17 01:10:26.560263 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 01:10:26.560268 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 01:10:26.560272 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 May 17 01:10:26.560277 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 01:10:26.560281 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 May 17 01:10:26.560286 kernel: Using GB pages for direct mapping May 17 01:10:26.560290 kernel: ACPI: Early table checksum verification disabled May 17 01:10:26.560298 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) May 17 01:10:26.560320 kernel: ACPI: XSDT 0x000000008C54F0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) May 17 01:10:26.560324 kernel: ACPI: FACP 0x000000008C58B5F0 000114 (v06 01072009 AMI 00010013) May 17 01:10:26.560343 kernel: ACPI: DSDT 0x000000008C54F268 03C386 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) May 17 01:10:26.560350 kernel: ACPI: FACS 0x000000008C66DF80 000040 May 17 01:10:26.560355 kernel: ACPI: APIC 0x000000008C58B708 00012C (v04 01072009 AMI 00010013) May 17 01:10:26.560375 kernel: ACPI: FPDT 0x000000008C58B838 000044 (v01 01072009 AMI 00010013) May 17 01:10:26.560380 kernel: ACPI: FIDT 0x000000008C58B880 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) May 17 01:10:26.560385 kernel: ACPI: MCFG 0x000000008C58B920 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) May 17 01:10:26.560389 kernel: ACPI: SPMI 0x000000008C58B960 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) May 17 01:10:26.560394 kernel: ACPI: SSDT 0x000000008C58B9A8 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) May 17 01:10:26.560399 kernel: ACPI: SSDT 0x000000008C58D4C8 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) May 17 01:10:26.560403 kernel: ACPI: SSDT 0x000000008C590690 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) May 17 01:10:26.560408 kernel: ACPI: HPET 0x000000008C5929C0 000038 (v01 SUPERM SMCI--MB 00000002 01000013) May 17 01:10:26.560414 kernel: ACPI: SSDT 0x000000008C5929F8 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) May 17 01:10:26.560418 kernel: ACPI: SSDT 0x000000008C5939A8 0008F7 (v02 INTEL xh_mossb 00000000 INTL 20160527) May 17 01:10:26.560423 kernel: ACPI: UEFI 0x000000008C5942A0 000042 (v01 SUPERM SMCI--MB 00000002 01000013) May 17 01:10:26.560428 kernel: ACPI: LPIT 0x000000008C5942E8 000094 (v01 SUPERM SMCI--MB 00000002 01000013) May 17 01:10:26.560432 kernel: ACPI: SSDT 0x000000008C594380 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) May 17 01:10:26.560437 kernel: ACPI: SSDT 0x000000008C596B60 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) May 17 01:10:26.560442 kernel: ACPI: DBGP 0x000000008C598048 000034 (v01 SUPERM SMCI--MB 00000002 01000013) May 17 01:10:26.560446 kernel: ACPI: DBG2 0x000000008C598080 000054 (v00 SUPERM SMCI--MB 00000002 01000013) May 17 01:10:26.560452 kernel: ACPI: SSDT 0x000000008C5980D8 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) May 17 01:10:26.560457 kernel: ACPI: DMAR 0x000000008C599C40 000070 (v01 INTEL EDK2 00000002 01000013) May 17 01:10:26.560461 kernel: ACPI: SSDT 0x000000008C599CB0 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) May 17 01:10:26.560466 kernel: ACPI: TPM2 0x000000008C599DF8 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) May 17 01:10:26.560471 kernel: ACPI: SSDT 0x000000008C599E30 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) May 17 01:10:26.560475 kernel: ACPI: WSMT 0x000000008C59ABC0 000028 (v01 SUPERM 01072009 AMI 00010013) May 17 01:10:26.560480 kernel: ACPI: EINJ 0x000000008C59ABE8 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) May 17 01:10:26.560485 kernel: ACPI: ERST 0x000000008C59AD18 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) May 17 01:10:26.560489 kernel: ACPI: BERT 0x000000008C59AF48 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) May 17 01:10:26.560495 kernel: ACPI: HEST 0x000000008C59AF78 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) May 17 01:10:26.560499 kernel: ACPI: SSDT 0x000000008C59B1F8 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) May 17 01:10:26.560504 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58b5f0-0x8c58b703] May 17 01:10:26.560509 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54f268-0x8c58b5ed] May 17 01:10:26.560514 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66df80-0x8c66dfbf] May 17 01:10:26.560518 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58b708-0x8c58b833] May 17 01:10:26.560523 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58b838-0x8c58b87b] May 17 01:10:26.560527 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58b880-0x8c58b91b] May 17 01:10:26.560533 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58b920-0x8c58b95b] May 17 01:10:26.560538 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58b960-0x8c58b9a0] May 17 01:10:26.560542 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58b9a8-0x8c58d4c3] May 17 01:10:26.560547 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58d4c8-0x8c59068d] May 17 01:10:26.560551 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c590690-0x8c5929ba] May 17 01:10:26.560556 kernel: ACPI: Reserving HPET table memory at [mem 0x8c5929c0-0x8c5929f7] May 17 01:10:26.560561 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c5929f8-0x8c5939a5] May 17 01:10:26.560565 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c5939a8-0x8c59429e] May 17 01:10:26.560570 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c5942a0-0x8c5942e1] May 17 01:10:26.560575 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c5942e8-0x8c59437b] May 17 01:10:26.560580 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c594380-0x8c596b5d] May 17 01:10:26.560585 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c596b60-0x8c598041] May 17 01:10:26.560589 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c598048-0x8c59807b] May 17 01:10:26.560594 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c598080-0x8c5980d3] May 17 01:10:26.560598 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c5980d8-0x8c599c3e] May 17 01:10:26.560603 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c599c40-0x8c599caf] May 17 01:10:26.560608 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c599cb0-0x8c599df3] May 17 01:10:26.560613 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c599df8-0x8c599e2b] May 17 01:10:26.560618 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c599e30-0x8c59abbe] May 17 01:10:26.560623 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c59abc0-0x8c59abe7] May 17 01:10:26.560627 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c59abe8-0x8c59ad17] May 17 01:10:26.560632 kernel: ACPI: Reserving ERST table memory at [mem 0x8c59ad18-0x8c59af47] May 17 01:10:26.560637 kernel: ACPI: Reserving BERT table memory at [mem 0x8c59af48-0x8c59af77] May 17 01:10:26.560641 kernel: ACPI: Reserving HEST table memory at [mem 0x8c59af78-0x8c59b1f3] May 17 01:10:26.560646 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59b1f8-0x8c59b359] May 17 01:10:26.560651 kernel: No NUMA configuration found May 17 01:10:26.560655 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] May 17 01:10:26.560661 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] May 17 01:10:26.560666 kernel: Zone ranges: May 17 01:10:26.560671 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 01:10:26.560675 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 17 01:10:26.560680 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] May 17 01:10:26.560684 kernel: Movable zone start for each node May 17 01:10:26.560689 kernel: Early memory node ranges May 17 01:10:26.560694 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] May 17 01:10:26.560698 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] May 17 01:10:26.560703 kernel: node 0: [mem 0x0000000040400000-0x0000000081a70fff] May 17 01:10:26.560709 kernel: node 0: [mem 0x0000000081a73000-0x000000008afcdfff] May 17 01:10:26.560714 kernel: node 0: [mem 0x000000008c0b3000-0x000000008c23bfff] May 17 01:10:26.560718 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] May 17 01:10:26.560723 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] May 17 01:10:26.560727 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] May 17 01:10:26.560732 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 01:10:26.560740 kernel: On node 0, zone DMA: 103 pages in unavailable ranges May 17 01:10:26.560746 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges May 17 01:10:26.560751 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges May 17 01:10:26.560756 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges May 17 01:10:26.560762 kernel: On node 0, zone DMA32: 11459 pages in unavailable ranges May 17 01:10:26.560767 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges May 17 01:10:26.560772 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges May 17 01:10:26.560777 kernel: ACPI: PM-Timer IO Port: 0x1808 May 17 01:10:26.560782 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) May 17 01:10:26.560787 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) May 17 01:10:26.560792 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) May 17 01:10:26.560798 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) May 17 01:10:26.560803 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) May 17 01:10:26.560808 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) May 17 01:10:26.560813 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) May 17 01:10:26.560818 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) May 17 01:10:26.560822 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) May 17 01:10:26.560828 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) May 17 01:10:26.560832 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) May 17 01:10:26.560837 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) May 17 01:10:26.560843 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) May 17 01:10:26.560848 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) May 17 01:10:26.560853 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) May 17 01:10:26.560858 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) May 17 01:10:26.560863 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 May 17 01:10:26.560868 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 17 01:10:26.560873 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 17 01:10:26.560878 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 01:10:26.560883 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 17 01:10:26.560889 kernel: TSC deadline timer available May 17 01:10:26.560894 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs May 17 01:10:26.560899 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices May 17 01:10:26.560904 kernel: Booting paravirtualized kernel on bare hardware May 17 01:10:26.560909 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 01:10:26.560914 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 May 17 01:10:26.560919 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 May 17 01:10:26.560925 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 May 17 01:10:26.560930 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 May 17 01:10:26.560935 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232416 May 17 01:10:26.560940 kernel: Policy zone: Normal May 17 01:10:26.560946 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 01:10:26.560951 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 01:10:26.560956 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) May 17 01:10:26.560961 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) May 17 01:10:26.560966 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 01:10:26.560972 kernel: Memory: 32722608K/33452984K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 730116K reserved, 0K cma-reserved) May 17 01:10:26.560977 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 May 17 01:10:26.560982 kernel: ftrace: allocating 34585 entries in 136 pages May 17 01:10:26.560987 kernel: ftrace: allocated 136 pages with 2 groups May 17 01:10:26.560992 kernel: rcu: Hierarchical RCU implementation. May 17 01:10:26.560998 kernel: rcu: RCU event tracing is enabled. May 17 01:10:26.561003 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. May 17 01:10:26.561008 kernel: Rude variant of Tasks RCU enabled. May 17 01:10:26.561013 kernel: Tracing variant of Tasks RCU enabled. May 17 01:10:26.561019 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 01:10:26.561024 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 May 17 01:10:26.561029 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 May 17 01:10:26.561034 kernel: random: crng init done May 17 01:10:26.561039 kernel: Console: colour dummy device 80x25 May 17 01:10:26.561044 kernel: printk: console [tty0] enabled May 17 01:10:26.561049 kernel: printk: console [ttyS1] enabled May 17 01:10:26.561054 kernel: ACPI: Core revision 20210730 May 17 01:10:26.561059 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns May 17 01:10:26.561064 kernel: APIC: Switch to symmetric I/O mode setup May 17 01:10:26.561070 kernel: DMAR: Host address width 39 May 17 01:10:26.561075 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 May 17 01:10:26.561080 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da May 17 01:10:26.561085 kernel: DMAR: RMRR base: 0x0000008cf19000 end: 0x0000008d162fff May 17 01:10:26.561090 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 May 17 01:10:26.561095 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 May 17 01:10:26.561100 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. May 17 01:10:26.561105 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode May 17 01:10:26.561110 kernel: x2apic enabled May 17 01:10:26.561116 kernel: Switched APIC routing to cluster x2apic. May 17 01:10:26.561121 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 17 01:10:26.561126 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns May 17 01:10:26.561131 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) May 17 01:10:26.561136 kernel: CPU0: Thermal monitoring enabled (TM1) May 17 01:10:26.561141 kernel: process: using mwait in idle threads May 17 01:10:26.561146 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 17 01:10:26.561151 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 17 01:10:26.561156 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 01:10:26.561162 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! May 17 01:10:26.561167 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit May 17 01:10:26.561172 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall May 17 01:10:26.561177 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS May 17 01:10:26.561182 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT May 17 01:10:26.561187 kernel: RETBleed: Mitigation: Enhanced IBRS May 17 01:10:26.561192 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 17 01:10:26.561197 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 17 01:10:26.561203 kernel: TAA: Mitigation: TSX disabled May 17 01:10:26.561208 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers May 17 01:10:26.561213 kernel: SRBDS: Mitigation: Microcode May 17 01:10:26.561218 kernel: GDS: Mitigation: Microcode May 17 01:10:26.561223 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 01:10:26.561228 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 01:10:26.561233 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 01:10:26.561238 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' May 17 01:10:26.561243 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' May 17 01:10:26.561249 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 01:10:26.561254 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 May 17 01:10:26.561259 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 May 17 01:10:26.561264 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. May 17 01:10:26.561269 kernel: Freeing SMP alternatives memory: 32K May 17 01:10:26.561274 kernel: pid_max: default: 32768 minimum: 301 May 17 01:10:26.561279 kernel: LSM: Security Framework initializing May 17 01:10:26.561284 kernel: SELinux: Initializing. May 17 01:10:26.561289 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) May 17 01:10:26.561297 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) May 17 01:10:26.561318 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 May 17 01:10:26.561323 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) May 17 01:10:26.561328 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. May 17 01:10:26.561333 kernel: ... version: 4 May 17 01:10:26.561354 kernel: ... bit width: 48 May 17 01:10:26.561359 kernel: ... generic registers: 4 May 17 01:10:26.561364 kernel: ... value mask: 0000ffffffffffff May 17 01:10:26.561369 kernel: ... max period: 00007fffffffffff May 17 01:10:26.561375 kernel: ... fixed-purpose events: 3 May 17 01:10:26.561380 kernel: ... event mask: 000000070000000f May 17 01:10:26.561385 kernel: signal: max sigframe size: 2032 May 17 01:10:26.561390 kernel: rcu: Hierarchical SRCU implementation. May 17 01:10:26.561395 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. May 17 01:10:26.561400 kernel: smp: Bringing up secondary CPUs ... May 17 01:10:26.561405 kernel: x86: Booting SMP configuration: May 17 01:10:26.561410 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 May 17 01:10:26.561416 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. May 17 01:10:26.561421 kernel: #9 #10 #11 #12 #13 #14 #15 May 17 01:10:26.561426 kernel: smp: Brought up 1 node, 16 CPUs May 17 01:10:26.561431 kernel: smpboot: Max logical packages: 1 May 17 01:10:26.561436 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) May 17 01:10:26.561441 kernel: devtmpfs: initialized May 17 01:10:26.561446 kernel: x86/mm: Memory block size: 128MB May 17 01:10:26.561451 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x81a71000-0x81a71fff] (4096 bytes) May 17 01:10:26.561457 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23c000-0x8c66dfff] (4399104 bytes) May 17 01:10:26.561462 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 01:10:26.561467 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) May 17 01:10:26.561472 kernel: pinctrl core: initialized pinctrl subsystem May 17 01:10:26.561477 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 01:10:26.561482 kernel: audit: initializing netlink subsys (disabled) May 17 01:10:26.561487 kernel: audit: type=2000 audit(1747444220.109:1): state=initialized audit_enabled=0 res=1 May 17 01:10:26.561492 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 01:10:26.561497 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 01:10:26.561502 kernel: cpuidle: using governor menu May 17 01:10:26.561507 kernel: ACPI: bus type PCI registered May 17 01:10:26.561513 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 01:10:26.561518 kernel: dca service started, version 1.12.1 May 17 01:10:26.561523 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) May 17 01:10:26.561528 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 May 17 01:10:26.561533 kernel: PCI: Using configuration type 1 for base access May 17 01:10:26.561538 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' May 17 01:10:26.561543 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 01:10:26.561548 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 01:10:26.561553 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 01:10:26.561559 kernel: ACPI: Added _OSI(Module Device) May 17 01:10:26.561564 kernel: ACPI: Added _OSI(Processor Device) May 17 01:10:26.561569 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 01:10:26.561574 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 01:10:26.561579 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 01:10:26.561584 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 01:10:26.561589 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 01:10:26.561594 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded May 17 01:10:26.561599 kernel: ACPI: Dynamic OEM Table Load: May 17 01:10:26.561605 kernel: ACPI: SSDT 0xFFFF8F22C021A000 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) May 17 01:10:26.561610 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked May 17 01:10:26.561615 kernel: ACPI: Dynamic OEM Table Load: May 17 01:10:26.561620 kernel: ACPI: SSDT 0xFFFF8F22C1AE7800 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) May 17 01:10:26.561625 kernel: ACPI: Dynamic OEM Table Load: May 17 01:10:26.561630 kernel: ACPI: SSDT 0xFFFF8F22C1A58000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) May 17 01:10:26.561635 kernel: ACPI: Dynamic OEM Table Load: May 17 01:10:26.561640 kernel: ACPI: SSDT 0xFFFF8F22C1B4B000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) May 17 01:10:26.561645 kernel: ACPI: Dynamic OEM Table Load: May 17 01:10:26.561649 kernel: ACPI: SSDT 0xFFFF8F22C0149000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) May 17 01:10:26.561655 kernel: ACPI: Dynamic OEM Table Load: May 17 01:10:26.561660 kernel: ACPI: SSDT 0xFFFF8F22C1AE3000 00030A (v02 PmRef ApCst 00003000 INTL 20160527) May 17 01:10:26.561665 kernel: ACPI: Interpreter enabled May 17 01:10:26.561670 kernel: ACPI: PM: (supports S0 S5) May 17 01:10:26.561675 kernel: ACPI: Using IOAPIC for interrupt routing May 17 01:10:26.561680 kernel: HEST: Enabling Firmware First mode for corrected errors. May 17 01:10:26.561685 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. May 17 01:10:26.561690 kernel: HEST: Table parsing has been initialized. May 17 01:10:26.561695 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. May 17 01:10:26.561701 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 01:10:26.561706 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F May 17 01:10:26.561711 kernel: ACPI: PM: Power Resource [USBC] May 17 01:10:26.561716 kernel: ACPI: PM: Power Resource [V0PR] May 17 01:10:26.561721 kernel: ACPI: PM: Power Resource [V1PR] May 17 01:10:26.561726 kernel: ACPI: PM: Power Resource [V2PR] May 17 01:10:26.561731 kernel: ACPI: PM: Power Resource [WRST] May 17 01:10:26.561736 kernel: ACPI: PM: Power Resource [FN00] May 17 01:10:26.561741 kernel: ACPI: PM: Power Resource [FN01] May 17 01:10:26.561746 kernel: ACPI: PM: Power Resource [FN02] May 17 01:10:26.561751 kernel: ACPI: PM: Power Resource [FN03] May 17 01:10:26.561756 kernel: ACPI: PM: Power Resource [FN04] May 17 01:10:26.561761 kernel: ACPI: PM: Power Resource [PIN] May 17 01:10:26.561766 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) May 17 01:10:26.561831 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 17 01:10:26.561878 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] May 17 01:10:26.561922 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] May 17 01:10:26.561929 kernel: PCI host bridge to bus 0000:00 May 17 01:10:26.561973 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 17 01:10:26.562011 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 17 01:10:26.562049 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 17 01:10:26.562085 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] May 17 01:10:26.562122 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] May 17 01:10:26.562159 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] May 17 01:10:26.562214 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 May 17 01:10:26.562265 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 May 17 01:10:26.562332 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold May 17 01:10:26.562396 kernel: pci 0000:00:01.1: [8086:1905] type 01 class 0x060400 May 17 01:10:26.562439 kernel: pci 0000:00:01.1: PME# supported from D0 D3hot D3cold May 17 01:10:26.562489 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 May 17 01:10:26.562532 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] May 17 01:10:26.562579 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 May 17 01:10:26.562621 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] May 17 01:10:26.562669 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 May 17 01:10:26.562712 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] May 17 01:10:26.562755 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold May 17 01:10:26.562804 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 May 17 01:10:26.562847 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] May 17 01:10:26.562890 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] May 17 01:10:26.562936 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 May 17 01:10:26.562979 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] May 17 01:10:26.563026 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 May 17 01:10:26.563070 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] May 17 01:10:26.563115 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 May 17 01:10:26.563158 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] May 17 01:10:26.563200 kernel: pci 0000:00:16.0: PME# supported from D3hot May 17 01:10:26.563244 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 May 17 01:10:26.563287 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] May 17 01:10:26.563352 kernel: pci 0000:00:16.1: PME# supported from D3hot May 17 01:10:26.563399 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 May 17 01:10:26.563442 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] May 17 01:10:26.563484 kernel: pci 0000:00:16.4: PME# supported from D3hot May 17 01:10:26.563531 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 May 17 01:10:26.563582 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] May 17 01:10:26.563628 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] May 17 01:10:26.563672 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] May 17 01:10:26.563715 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] May 17 01:10:26.563757 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] May 17 01:10:26.563800 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] May 17 01:10:26.563842 kernel: pci 0000:00:17.0: PME# supported from D3hot May 17 01:10:26.563891 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 May 17 01:10:26.563936 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold May 17 01:10:26.563985 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 May 17 01:10:26.564030 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold May 17 01:10:26.564076 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 May 17 01:10:26.564121 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold May 17 01:10:26.564168 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 May 17 01:10:26.564214 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold May 17 01:10:26.564263 kernel: pci 0000:00:1c.1: [8086:a339] type 01 class 0x060400 May 17 01:10:26.564310 kernel: pci 0000:00:1c.1: PME# supported from D0 D3hot D3cold May 17 01:10:26.564358 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 May 17 01:10:26.564403 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] May 17 01:10:26.564452 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 May 17 01:10:26.564498 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 May 17 01:10:26.564543 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] May 17 01:10:26.564585 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] May 17 01:10:26.564632 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 May 17 01:10:26.564676 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] May 17 01:10:26.564721 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] May 17 01:10:26.564771 kernel: pci 0000:02:00.0: [15b3:1015] type 00 class 0x020000 May 17 01:10:26.564816 kernel: pci 0000:02:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] May 17 01:10:26.564861 kernel: pci 0000:02:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] May 17 01:10:26.564905 kernel: pci 0000:02:00.0: PME# supported from D3cold May 17 01:10:26.564950 kernel: pci 0000:02:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] May 17 01:10:26.564995 kernel: pci 0000:02:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) May 17 01:10:26.565046 kernel: pci 0000:02:00.1: [15b3:1015] type 00 class 0x020000 May 17 01:10:26.565091 kernel: pci 0000:02:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] May 17 01:10:26.565136 kernel: pci 0000:02:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] May 17 01:10:26.565180 kernel: pci 0000:02:00.1: PME# supported from D3cold May 17 01:10:26.565225 kernel: pci 0000:02:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] May 17 01:10:26.565269 kernel: pci 0000:02:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) May 17 01:10:26.565316 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] May 17 01:10:26.565363 kernel: pci 0000:00:01.1: bridge window [mem 0x95100000-0x952fffff] May 17 01:10:26.565406 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] May 17 01:10:26.565450 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] May 17 01:10:26.565497 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect May 17 01:10:26.565563 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 May 17 01:10:26.565606 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] May 17 01:10:26.565652 kernel: pci 0000:04:00.0: reg 0x18: [io 0x5000-0x501f] May 17 01:10:26.565698 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] May 17 01:10:26.565742 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold May 17 01:10:26.565785 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] May 17 01:10:26.565827 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] May 17 01:10:26.565870 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] May 17 01:10:26.565920 kernel: pci 0000:05:00.0: working around ROM BAR overlap defect May 17 01:10:26.565965 kernel: pci 0000:05:00.0: [8086:1533] type 00 class 0x020000 May 17 01:10:26.566011 kernel: pci 0000:05:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] May 17 01:10:26.566055 kernel: pci 0000:05:00.0: reg 0x18: [io 0x4000-0x401f] May 17 01:10:26.566098 kernel: pci 0000:05:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] May 17 01:10:26.566142 kernel: pci 0000:05:00.0: PME# supported from D0 D3hot D3cold May 17 01:10:26.566217 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] May 17 01:10:26.566282 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] May 17 01:10:26.566344 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] May 17 01:10:26.566387 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] May 17 01:10:26.566437 kernel: pci 0000:07:00.0: [1a03:1150] type 01 class 0x060400 May 17 01:10:26.566482 kernel: pci 0000:07:00.0: enabling Extended Tags May 17 01:10:26.566526 kernel: pci 0000:07:00.0: supports D1 D2 May 17 01:10:26.566569 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold May 17 01:10:26.566612 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] May 17 01:10:26.566655 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] May 17 01:10:26.566698 kernel: pci 0000:00:1c.1: bridge window [mem 0x94000000-0x950fffff] May 17 01:10:26.566744 kernel: pci_bus 0000:08: extended config space not accessible May 17 01:10:26.566797 kernel: pci 0000:08:00.0: [1a03:2000] type 00 class 0x030000 May 17 01:10:26.566844 kernel: pci 0000:08:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] May 17 01:10:26.566891 kernel: pci 0000:08:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] May 17 01:10:26.566938 kernel: pci 0000:08:00.0: reg 0x18: [io 0x3000-0x307f] May 17 01:10:26.566986 kernel: pci 0000:08:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 17 01:10:26.567031 kernel: pci 0000:08:00.0: supports D1 D2 May 17 01:10:26.567078 kernel: pci 0000:08:00.0: PME# supported from D0 D1 D2 D3hot D3cold May 17 01:10:26.567124 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] May 17 01:10:26.567168 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] May 17 01:10:26.567213 kernel: pci 0000:07:00.0: bridge window [mem 0x94000000-0x950fffff] May 17 01:10:26.567221 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 May 17 01:10:26.567227 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 May 17 01:10:26.567232 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 May 17 01:10:26.567237 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 May 17 01:10:26.567243 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 May 17 01:10:26.567249 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 May 17 01:10:26.567255 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 May 17 01:10:26.567260 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 May 17 01:10:26.567265 kernel: iommu: Default domain type: Translated May 17 01:10:26.567271 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 01:10:26.567360 kernel: pci 0000:08:00.0: vgaarb: setting as boot VGA device May 17 01:10:26.567407 kernel: pci 0000:08:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 17 01:10:26.567453 kernel: pci 0000:08:00.0: vgaarb: bridge control possible May 17 01:10:26.567460 kernel: vgaarb: loaded May 17 01:10:26.567467 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 01:10:26.567473 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 01:10:26.567478 kernel: PTP clock support registered May 17 01:10:26.567483 kernel: PCI: Using ACPI for IRQ routing May 17 01:10:26.567489 kernel: PCI: pci_cache_line_size set to 64 bytes May 17 01:10:26.567494 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] May 17 01:10:26.567499 kernel: e820: reserve RAM buffer [mem 0x81a71000-0x83ffffff] May 17 01:10:26.567504 kernel: e820: reserve RAM buffer [mem 0x8afce000-0x8bffffff] May 17 01:10:26.567510 kernel: e820: reserve RAM buffer [mem 0x8c23c000-0x8fffffff] May 17 01:10:26.567515 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] May 17 01:10:26.567521 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] May 17 01:10:26.567526 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 May 17 01:10:26.567531 kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter May 17 01:10:26.567537 kernel: clocksource: Switched to clocksource tsc-early May 17 01:10:26.567542 kernel: VFS: Disk quotas dquot_6.6.0 May 17 01:10:26.567547 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 01:10:26.567553 kernel: pnp: PnP ACPI init May 17 01:10:26.567597 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved May 17 01:10:26.567645 kernel: pnp 00:02: [dma 0 disabled] May 17 01:10:26.567687 kernel: pnp 00:03: [dma 0 disabled] May 17 01:10:26.567728 kernel: system 00:04: [io 0x0680-0x069f] has been reserved May 17 01:10:26.567767 kernel: system 00:04: [io 0x164e-0x164f] has been reserved May 17 01:10:26.567808 kernel: system 00:05: [io 0x1854-0x1857] has been reserved May 17 01:10:26.567852 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved May 17 01:10:26.567892 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved May 17 01:10:26.567930 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved May 17 01:10:26.567969 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved May 17 01:10:26.568006 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved May 17 01:10:26.568045 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved May 17 01:10:26.568082 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved May 17 01:10:26.568122 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved May 17 01:10:26.568163 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved May 17 01:10:26.568201 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved May 17 01:10:26.568239 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved May 17 01:10:26.568276 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved May 17 01:10:26.568355 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved May 17 01:10:26.568394 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved May 17 01:10:26.568433 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved May 17 01:10:26.568475 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved May 17 01:10:26.568482 kernel: pnp: PnP ACPI: found 10 devices May 17 01:10:26.568488 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 01:10:26.568493 kernel: NET: Registered PF_INET protocol family May 17 01:10:26.568499 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 17 01:10:26.568504 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) May 17 01:10:26.568510 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 01:10:26.568516 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 17 01:10:26.568522 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) May 17 01:10:26.568527 kernel: TCP: Hash tables configured (established 262144 bind 65536) May 17 01:10:26.568533 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) May 17 01:10:26.568538 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) May 17 01:10:26.568543 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 01:10:26.568549 kernel: NET: Registered PF_XDP protocol family May 17 01:10:26.568591 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] May 17 01:10:26.568635 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] May 17 01:10:26.568679 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] May 17 01:10:26.568724 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] May 17 01:10:26.568769 kernel: pci 0000:02:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] May 17 01:10:26.568814 kernel: pci 0000:02:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] May 17 01:10:26.568859 kernel: pci 0000:02:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] May 17 01:10:26.568903 kernel: pci 0000:02:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] May 17 01:10:26.568947 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] May 17 01:10:26.568992 kernel: pci 0000:00:01.1: bridge window [mem 0x95100000-0x952fffff] May 17 01:10:26.569035 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] May 17 01:10:26.569078 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] May 17 01:10:26.569121 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] May 17 01:10:26.569164 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] May 17 01:10:26.569210 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] May 17 01:10:26.569253 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] May 17 01:10:26.569321 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] May 17 01:10:26.569365 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] May 17 01:10:26.569409 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] May 17 01:10:26.569455 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] May 17 01:10:26.569499 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] May 17 01:10:26.569545 kernel: pci 0000:07:00.0: bridge window [mem 0x94000000-0x950fffff] May 17 01:10:26.569588 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] May 17 01:10:26.569634 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] May 17 01:10:26.569677 kernel: pci 0000:00:1c.1: bridge window [mem 0x94000000-0x950fffff] May 17 01:10:26.569718 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc May 17 01:10:26.569759 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 17 01:10:26.569797 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 17 01:10:26.569834 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 17 01:10:26.569872 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] May 17 01:10:26.569911 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] May 17 01:10:26.569958 kernel: pci_bus 0000:02: resource 1 [mem 0x95100000-0x952fffff] May 17 01:10:26.569999 kernel: pci_bus 0000:02: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] May 17 01:10:26.570045 kernel: pci_bus 0000:04: resource 0 [io 0x5000-0x5fff] May 17 01:10:26.570085 kernel: pci_bus 0000:04: resource 1 [mem 0x95400000-0x954fffff] May 17 01:10:26.570129 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] May 17 01:10:26.570170 kernel: pci_bus 0000:05: resource 1 [mem 0x95300000-0x953fffff] May 17 01:10:26.570216 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] May 17 01:10:26.570257 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] May 17 01:10:26.570303 kernel: pci_bus 0000:08: resource 0 [io 0x3000-0x3fff] May 17 01:10:26.570346 kernel: pci_bus 0000:08: resource 1 [mem 0x94000000-0x950fffff] May 17 01:10:26.570354 kernel: PCI: CLS 64 bytes, default 64 May 17 01:10:26.570359 kernel: DMAR: No ATSR found May 17 01:10:26.570365 kernel: DMAR: No SATC found May 17 01:10:26.570370 kernel: DMAR: dmar0: Using Queued invalidation May 17 01:10:26.570416 kernel: pci 0000:00:00.0: Adding to iommu group 0 May 17 01:10:26.570461 kernel: pci 0000:00:01.0: Adding to iommu group 1 May 17 01:10:26.570504 kernel: pci 0000:00:01.1: Adding to iommu group 1 May 17 01:10:26.570567 kernel: pci 0000:00:08.0: Adding to iommu group 2 May 17 01:10:26.570609 kernel: pci 0000:00:12.0: Adding to iommu group 3 May 17 01:10:26.570652 kernel: pci 0000:00:14.0: Adding to iommu group 4 May 17 01:10:26.570694 kernel: pci 0000:00:14.2: Adding to iommu group 4 May 17 01:10:26.570737 kernel: pci 0000:00:15.0: Adding to iommu group 5 May 17 01:10:26.570781 kernel: pci 0000:00:15.1: Adding to iommu group 5 May 17 01:10:26.570823 kernel: pci 0000:00:16.0: Adding to iommu group 6 May 17 01:10:26.570866 kernel: pci 0000:00:16.1: Adding to iommu group 6 May 17 01:10:26.570908 kernel: pci 0000:00:16.4: Adding to iommu group 6 May 17 01:10:26.570951 kernel: pci 0000:00:17.0: Adding to iommu group 7 May 17 01:10:26.570993 kernel: pci 0000:00:1b.0: Adding to iommu group 8 May 17 01:10:26.571036 kernel: pci 0000:00:1b.4: Adding to iommu group 9 May 17 01:10:26.571079 kernel: pci 0000:00:1b.5: Adding to iommu group 10 May 17 01:10:26.571122 kernel: pci 0000:00:1c.0: Adding to iommu group 11 May 17 01:10:26.571167 kernel: pci 0000:00:1c.1: Adding to iommu group 12 May 17 01:10:26.571208 kernel: pci 0000:00:1e.0: Adding to iommu group 13 May 17 01:10:26.571252 kernel: pci 0000:00:1f.0: Adding to iommu group 14 May 17 01:10:26.571296 kernel: pci 0000:00:1f.4: Adding to iommu group 14 May 17 01:10:26.571372 kernel: pci 0000:00:1f.5: Adding to iommu group 14 May 17 01:10:26.571416 kernel: pci 0000:02:00.0: Adding to iommu group 1 May 17 01:10:26.571460 kernel: pci 0000:02:00.1: Adding to iommu group 1 May 17 01:10:26.571504 kernel: pci 0000:04:00.0: Adding to iommu group 15 May 17 01:10:26.571550 kernel: pci 0000:05:00.0: Adding to iommu group 16 May 17 01:10:26.571594 kernel: pci 0000:07:00.0: Adding to iommu group 17 May 17 01:10:26.571641 kernel: pci 0000:08:00.0: Adding to iommu group 17 May 17 01:10:26.571648 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O May 17 01:10:26.571654 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 17 01:10:26.571659 kernel: software IO TLB: mapped [mem 0x0000000086fce000-0x000000008afce000] (64MB) May 17 01:10:26.571665 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer May 17 01:10:26.571670 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules May 17 01:10:26.571677 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules May 17 01:10:26.571682 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules May 17 01:10:26.571731 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) May 17 01:10:26.571739 kernel: Initialise system trusted keyrings May 17 01:10:26.571744 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 May 17 01:10:26.571750 kernel: Key type asymmetric registered May 17 01:10:26.571755 kernel: Asymmetric key parser 'x509' registered May 17 01:10:26.571761 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 01:10:26.571767 kernel: io scheduler mq-deadline registered May 17 01:10:26.571773 kernel: io scheduler kyber registered May 17 01:10:26.571778 kernel: io scheduler bfq registered May 17 01:10:26.571820 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 May 17 01:10:26.571864 kernel: pcieport 0000:00:01.1: PME: Signaling with IRQ 122 May 17 01:10:26.571906 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 123 May 17 01:10:26.571951 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 124 May 17 01:10:26.571994 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 125 May 17 01:10:26.572038 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 126 May 17 01:10:26.572081 kernel: pcieport 0000:00:1c.1: PME: Signaling with IRQ 127 May 17 01:10:26.572129 kernel: thermal LNXTHERM:00: registered as thermal_zone0 May 17 01:10:26.572137 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) May 17 01:10:26.572143 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. May 17 01:10:26.572148 kernel: pstore: Registered erst as persistent store backend May 17 01:10:26.572153 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 01:10:26.572159 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 01:10:26.572165 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 01:10:26.572171 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A May 17 01:10:26.572213 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) May 17 01:10:26.572221 kernel: i8042: PNP: No PS/2 controller found. May 17 01:10:26.572259 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 May 17 01:10:26.572323 kernel: rtc_cmos rtc_cmos: registered as rtc0 May 17 01:10:26.572382 kernel: rtc_cmos rtc_cmos: setting system clock to 2025-05-17T01:10:25 UTC (1747444225) May 17 01:10:26.572421 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram May 17 01:10:26.572430 kernel: intel_pstate: Intel P-state driver initializing May 17 01:10:26.572435 kernel: intel_pstate: Disabling energy efficiency optimization May 17 01:10:26.572441 kernel: intel_pstate: HWP enabled May 17 01:10:26.572446 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 May 17 01:10:26.572451 kernel: vesafb: scrolling: redraw May 17 01:10:26.572457 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 May 17 01:10:26.572462 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x00000000cc6c7663, using 768k, total 768k May 17 01:10:26.572468 kernel: Console: switching to colour frame buffer device 128x48 May 17 01:10:26.572473 kernel: fb0: VESA VGA frame buffer device May 17 01:10:26.572479 kernel: NET: Registered PF_INET6 protocol family May 17 01:10:26.572484 kernel: Segment Routing with IPv6 May 17 01:10:26.572490 kernel: In-situ OAM (IOAM) with IPv6 May 17 01:10:26.572495 kernel: NET: Registered PF_PACKET protocol family May 17 01:10:26.572501 kernel: Key type dns_resolver registered May 17 01:10:26.572506 kernel: microcode: sig=0x906ed, pf=0x2, revision=0x102 May 17 01:10:26.572511 kernel: microcode: Microcode Update Driver: v2.2. May 17 01:10:26.572517 kernel: IPI shorthand broadcast: enabled May 17 01:10:26.572522 kernel: sched_clock: Marking stable (1767394753, 1334473438)->(4513535889, -1411667698) May 17 01:10:26.572529 kernel: registered taskstats version 1 May 17 01:10:26.572534 kernel: Loading compiled-in X.509 certificates May 17 01:10:26.572539 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 01:10:26.572545 kernel: Key type .fscrypt registered May 17 01:10:26.572550 kernel: Key type fscrypt-provisioning registered May 17 01:10:26.572555 kernel: pstore: Using crash dump compression: deflate May 17 01:10:26.572560 kernel: ima: Allocated hash algorithm: sha1 May 17 01:10:26.572566 kernel: ima: No architecture policies found May 17 01:10:26.572572 kernel: clk: Disabling unused clocks May 17 01:10:26.572577 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 01:10:26.572583 kernel: Write protecting the kernel read-only data: 28672k May 17 01:10:26.572588 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 01:10:26.572593 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 01:10:26.572599 kernel: Run /init as init process May 17 01:10:26.572604 kernel: with arguments: May 17 01:10:26.572609 kernel: /init May 17 01:10:26.572615 kernel: with environment: May 17 01:10:26.572621 kernel: HOME=/ May 17 01:10:26.572626 kernel: TERM=linux May 17 01:10:26.572631 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 01:10:26.572637 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 01:10:26.572644 systemd[1]: Detected architecture x86-64. May 17 01:10:26.572650 systemd[1]: Running in initrd. May 17 01:10:26.572656 systemd[1]: No hostname configured, using default hostname. May 17 01:10:26.572661 systemd[1]: Hostname set to . May 17 01:10:26.572667 systemd[1]: Initializing machine ID from random generator. May 17 01:10:26.572673 systemd[1]: Queued start job for default target initrd.target. May 17 01:10:26.572678 systemd[1]: Started systemd-ask-password-console.path. May 17 01:10:26.572684 systemd[1]: Reached target cryptsetup.target. May 17 01:10:26.572689 systemd[1]: Reached target paths.target. May 17 01:10:26.572694 systemd[1]: Reached target slices.target. May 17 01:10:26.572700 systemd[1]: Reached target swap.target. May 17 01:10:26.572705 systemd[1]: Reached target timers.target. May 17 01:10:26.572710 systemd[1]: Listening on iscsid.socket. May 17 01:10:26.572717 systemd[1]: Listening on iscsiuio.socket. May 17 01:10:26.572723 systemd[1]: Listening on systemd-journald-audit.socket. May 17 01:10:26.572728 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 01:10:26.572734 systemd[1]: Listening on systemd-journald.socket. May 17 01:10:26.572739 systemd[1]: Listening on systemd-networkd.socket. May 17 01:10:26.572745 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz May 17 01:10:26.572750 systemd[1]: Listening on systemd-udevd-control.socket. May 17 01:10:26.572756 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns May 17 01:10:26.572762 kernel: clocksource: Switched to clocksource tsc May 17 01:10:26.572767 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 01:10:26.572773 systemd[1]: Reached target sockets.target. May 17 01:10:26.572779 systemd[1]: Starting kmod-static-nodes.service... May 17 01:10:26.572784 systemd[1]: Finished network-cleanup.service. May 17 01:10:26.572789 systemd[1]: Starting systemd-fsck-usr.service... May 17 01:10:26.572795 systemd[1]: Starting systemd-journald.service... May 17 01:10:26.572800 systemd[1]: Starting systemd-modules-load.service... May 17 01:10:26.572810 systemd-journald[268]: Journal started May 17 01:10:26.572836 systemd-journald[268]: Runtime Journal (/run/log/journal/410adba0d52b4d19855b3cfd87a288c6) is 8.0M, max 640.1M, 632.1M free. May 17 01:10:26.575003 systemd-modules-load[269]: Inserted module 'overlay' May 17 01:10:26.603397 kernel: audit: type=1334 audit(1747444226.579:2): prog-id=6 op=LOAD May 17 01:10:26.603408 systemd[1]: Starting systemd-resolved.service... May 17 01:10:26.579000 audit: BPF prog-id=6 op=LOAD May 17 01:10:26.647347 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 01:10:26.647363 systemd[1]: Starting systemd-vconsole-setup.service... May 17 01:10:26.680299 kernel: Bridge firewalling registered May 17 01:10:26.680315 systemd[1]: Started systemd-journald.service. May 17 01:10:26.694991 systemd-modules-load[269]: Inserted module 'br_netfilter' May 17 01:10:26.743562 kernel: audit: type=1130 audit(1747444226.702:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:26.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:26.697607 systemd-resolved[271]: Positive Trust Anchors: May 17 01:10:26.807408 kernel: SCSI subsystem initialized May 17 01:10:26.807495 kernel: audit: type=1130 audit(1747444226.754:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:26.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:26.697612 systemd-resolved[271]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 01:10:26.923385 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 01:10:26.923398 kernel: audit: type=1130 audit(1747444226.826:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:26.923405 kernel: device-mapper: uevent: version 1.0.3 May 17 01:10:26.923412 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 01:10:26.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:26.697632 systemd-resolved[271]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 01:10:26.996561 kernel: audit: type=1130 audit(1747444226.930:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:26.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:26.699258 systemd-resolved[271]: Defaulting to hostname 'linux'. May 17 01:10:27.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:26.703525 systemd[1]: Started systemd-resolved.service. May 17 01:10:27.105744 kernel: audit: type=1130 audit(1747444227.004:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:27.105759 kernel: audit: type=1130 audit(1747444227.058:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:27.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:26.755485 systemd[1]: Finished kmod-static-nodes.service. May 17 01:10:26.827460 systemd[1]: Finished systemd-fsck-usr.service. May 17 01:10:26.925347 systemd-modules-load[269]: Inserted module 'dm_multipath' May 17 01:10:26.931609 systemd[1]: Finished systemd-modules-load.service. May 17 01:10:27.005678 systemd[1]: Finished systemd-vconsole-setup.service. May 17 01:10:27.059598 systemd[1]: Reached target nss-lookup.target. May 17 01:10:27.114917 systemd[1]: Starting dracut-cmdline-ask.service... May 17 01:10:27.134832 systemd[1]: Starting systemd-sysctl.service... May 17 01:10:27.135126 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 01:10:27.138037 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 01:10:27.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:27.138721 systemd[1]: Finished systemd-sysctl.service. May 17 01:10:27.188522 kernel: audit: type=1130 audit(1747444227.136:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:27.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:27.200630 systemd[1]: Finished dracut-cmdline-ask.service. May 17 01:10:27.266361 kernel: audit: type=1130 audit(1747444227.199:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:27.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:27.257933 systemd[1]: Starting dracut-cmdline.service... May 17 01:10:27.280420 dracut-cmdline[294]: dracut-dracut-053 May 17 01:10:27.280420 dracut-cmdline[294]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA May 17 01:10:27.280420 dracut-cmdline[294]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 01:10:27.348369 kernel: Loading iSCSI transport class v2.0-870. May 17 01:10:27.348382 kernel: iscsi: registered transport (tcp) May 17 01:10:27.407821 kernel: iscsi: registered transport (qla4xxx) May 17 01:10:27.407837 kernel: QLogic iSCSI HBA Driver May 17 01:10:27.424427 systemd[1]: Finished dracut-cmdline.service. May 17 01:10:27.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:27.425057 systemd[1]: Starting dracut-pre-udev.service... May 17 01:10:27.480355 kernel: raid6: avx2x4 gen() 48405 MB/s May 17 01:10:27.515362 kernel: raid6: avx2x4 xor() 21150 MB/s May 17 01:10:27.550364 kernel: raid6: avx2x2 gen() 54817 MB/s May 17 01:10:27.585332 kernel: raid6: avx2x2 xor() 32687 MB/s May 17 01:10:27.620363 kernel: raid6: avx2x1 gen() 45796 MB/s May 17 01:10:27.655339 kernel: raid6: avx2x1 xor() 28026 MB/s May 17 01:10:27.690364 kernel: raid6: sse2x4 gen() 21514 MB/s May 17 01:10:27.724355 kernel: raid6: sse2x4 xor() 11677 MB/s May 17 01:10:27.758331 kernel: raid6: sse2x2 gen() 21990 MB/s May 17 01:10:27.792355 kernel: raid6: sse2x2 xor() 13676 MB/s May 17 01:10:27.826362 kernel: raid6: sse2x1 gen() 18571 MB/s May 17 01:10:27.878134 kernel: raid6: sse2x1 xor() 8963 MB/s May 17 01:10:27.878149 kernel: raid6: using algorithm avx2x2 gen() 54817 MB/s May 17 01:10:27.878157 kernel: raid6: .... xor() 32687 MB/s, rmw enabled May 17 01:10:27.896375 kernel: raid6: using avx2x2 recovery algorithm May 17 01:10:27.942305 kernel: xor: automatically using best checksumming function avx May 17 01:10:28.020343 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 01:10:28.025781 systemd[1]: Finished dracut-pre-udev.service. May 17 01:10:28.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:28.024000 audit: BPF prog-id=7 op=LOAD May 17 01:10:28.024000 audit: BPF prog-id=8 op=LOAD May 17 01:10:28.026469 systemd[1]: Starting systemd-udevd.service... May 17 01:10:28.034512 systemd-udevd[475]: Using default interface naming scheme 'v252'. May 17 01:10:28.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:28.046706 systemd[1]: Started systemd-udevd.service. May 17 01:10:28.086445 dracut-pre-trigger[487]: rd.md=0: removing MD RAID activation May 17 01:10:28.063015 systemd[1]: Starting dracut-pre-trigger.service... May 17 01:10:28.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:28.088601 systemd[1]: Finished dracut-pre-trigger.service. May 17 01:10:28.103272 systemd[1]: Starting systemd-udev-trigger.service... May 17 01:10:28.184463 systemd[1]: Finished systemd-udev-trigger.service. May 17 01:10:28.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:28.212338 kernel: cryptd: max_cpu_qlen set to 1000 May 17 01:10:28.214326 kernel: libata version 3.00 loaded. May 17 01:10:28.214351 kernel: ACPI: bus type USB registered May 17 01:10:28.248793 kernel: usbcore: registered new interface driver usbfs May 17 01:10:28.248834 kernel: usbcore: registered new interface driver hub May 17 01:10:28.266592 kernel: usbcore: registered new device driver usb May 17 01:10:28.284303 kernel: AVX2 version of gcm_enc/dec engaged. May 17 01:10:28.301302 kernel: igb: Intel(R) Gigabit Ethernet Network Driver May 17 01:10:28.335501 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. May 17 01:10:28.335524 kernel: AES CTR mode by8 optimization enabled May 17 01:10:28.352300 kernel: ahci 0000:00:17.0: version 3.0 May 17 01:10:28.915956 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 8 ports 6 Gbps 0xff impl SATA mode May 17 01:10:28.916029 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst May 17 01:10:28.916092 kernel: igb 0000:04:00.0: added PHC on eth0 May 17 01:10:28.916153 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection May 17 01:10:28.916217 kernel: scsi host0: ahci May 17 01:10:28.916289 kernel: igb 0000:04:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:73:1b:28 May 17 01:10:28.916350 kernel: scsi host1: ahci May 17 01:10:28.916404 kernel: igb 0000:04:00.0: eth0: PBA No: 010000-000 May 17 01:10:28.916456 kernel: scsi host2: ahci May 17 01:10:28.916513 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) May 17 01:10:28.916564 kernel: scsi host3: ahci May 17 01:10:28.916616 kernel: scsi host4: ahci May 17 01:10:28.916669 kernel: scsi host5: ahci May 17 01:10:28.916721 kernel: mlx5_core 0000:02:00.0: firmware version: 14.31.1014 May 17 01:10:29.303863 kernel: igb 0000:05:00.0: added PHC on eth1 May 17 01:10:29.303938 kernel: igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection May 17 01:10:29.303999 kernel: igb 0000:05:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:73:1b:29 May 17 01:10:29.304054 kernel: igb 0000:05:00.0: eth1: PBA No: 010000-000 May 17 01:10:29.304108 kernel: igb 0000:05:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) May 17 01:10:29.304159 kernel: scsi host6: ahci May 17 01:10:29.304219 kernel: mlx5_core 0000:02:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) May 17 01:10:29.304273 kernel: scsi host7: ahci May 17 01:10:29.304336 kernel: igb 0000:05:00.0 eno2: renamed from eth1 May 17 01:10:29.304389 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 133 May 17 01:10:29.304398 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 133 May 17 01:10:29.304406 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller May 17 01:10:29.304458 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 133 May 17 01:10:29.304466 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 May 17 01:10:29.304515 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 133 May 17 01:10:29.304522 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 May 17 01:10:29.304571 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 133 May 17 01:10:29.304578 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller May 17 01:10:29.304629 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 133 May 17 01:10:29.304637 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 May 17 01:10:29.304686 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 133 May 17 01:10:29.304693 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed May 17 01:10:29.304742 kernel: mlx5_core 0000:02:00.0: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048) May 17 01:10:29.304793 kernel: ata8: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516480 irq 133 May 17 01:10:29.304801 kernel: hub 1-0:1.0: USB hub found May 17 01:10:29.304863 kernel: hub 1-0:1.0: 16 ports detected May 17 01:10:29.304919 kernel: hub 2-0:1.0: USB hub found May 17 01:10:29.304979 kernel: igb 0000:04:00.0 eno1: renamed from eth0 May 17 01:10:29.305033 kernel: hub 2-0:1.0: 10 ports detected May 17 01:10:29.305086 kernel: mlx5_core 0000:02:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) May 17 01:10:29.305137 kernel: ata3: SATA link down (SStatus 0 SControl 300) May 17 01:10:29.305145 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd May 17 01:10:29.305159 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) May 17 01:10:29.305168 kernel: mlx5_core 0000:02:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 May 17 01:10:29.305220 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 17 01:10:29.305227 kernel: mlx5_core 0000:02:00.1: firmware version: 14.31.1014 May 17 01:10:29.997467 kernel: ata7: SATA link down (SStatus 0 SControl 300) May 17 01:10:29.997478 kernel: mlx5_core 0000:02:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) May 17 01:10:29.997542 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 17 01:10:29.997550 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) May 17 01:10:29.997556 kernel: hub 1-14:1.0: USB hub found May 17 01:10:29.997621 kernel: ata8: SATA link down (SStatus 0 SControl 300) May 17 01:10:29.997629 kernel: hub 1-14:1.0: 4 ports detected May 17 01:10:29.997686 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 17 01:10:29.997693 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 May 17 01:10:29.997699 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 May 17 01:10:29.997706 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA May 17 01:10:29.997712 kernel: ata1.00: Features: NCQ-prio May 17 01:10:29.997718 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA May 17 01:10:29.997726 kernel: ata2.00: Features: NCQ-prio May 17 01:10:29.997732 kernel: ata1.00: configured for UDMA/133 May 17 01:10:29.997739 kernel: ata2.00: configured for UDMA/133 May 17 01:10:29.997745 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 May 17 01:10:30.121070 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 May 17 01:10:30.121196 kernel: mlx5_core 0000:02:00.1: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048) May 17 01:10:30.121289 kernel: port_module: 9 callbacks suppressed May 17 01:10:30.121309 kernel: mlx5_core 0000:02:00.1: Port module event: module 1, Cable plugged May 17 01:10:30.121402 kernel: ata1.00: Enabling discard_zeroes_data May 17 01:10:30.121416 kernel: mlx5_core 0000:02:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) May 17 01:10:30.121522 kernel: ata2.00: Enabling discard_zeroes_data May 17 01:10:30.121530 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd May 17 01:10:30.121633 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) May 17 01:10:30.121719 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) May 17 01:10:30.121818 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks May 17 01:10:30.121912 kernel: sd 0:0:0:0: [sda] Write Protect is off May 17 01:10:30.122003 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks May 17 01:10:30.122063 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 May 17 01:10:30.122118 kernel: sd 1:0:0:0: [sdb] Write Protect is off May 17 01:10:30.122172 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA May 17 01:10:30.122228 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 May 17 01:10:30.122284 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA May 17 01:10:30.122347 kernel: ata1.00: Enabling discard_zeroes_data May 17 01:10:30.122370 kernel: hid: raw HID events driver (C) Jiri Kosina May 17 01:10:30.122377 kernel: ata2.00: Enabling discard_zeroes_data May 17 01:10:30.122384 kernel: ata1.00: Enabling discard_zeroes_data May 17 01:10:30.122390 kernel: mlx5_core 0000:02:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 May 17 01:10:30.122442 kernel: sd 0:0:0:0: [sda] Attached SCSI disk May 17 01:10:30.122497 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 17 01:10:30.122504 kernel: GPT:9289727 != 937703087 May 17 01:10:30.122512 kernel: GPT:Alternate GPT header not at the end of the disk. May 17 01:10:30.122519 kernel: GPT:9289727 != 937703087 May 17 01:10:30.122525 kernel: GPT: Use GNU Parted to correct GPT errors. May 17 01:10:30.122531 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 May 17 01:10:30.122538 kernel: ata2.00: Enabling discard_zeroes_data May 17 01:10:30.122544 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk May 17 01:10:30.138300 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: renamed from eth0 May 17 01:10:30.151361 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 01:10:30.185958 kernel: usbcore: registered new interface driver usbhid May 17 01:10:30.185970 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sdb6 scanned by (udev-worker) (663) May 17 01:10:30.185977 kernel: usbhid: USB HID core driver May 17 01:10:30.215411 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 01:10:30.252357 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 May 17 01:10:30.252372 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: renamed from eth1 May 17 01:10:30.239274 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 01:10:30.265397 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 01:10:30.305731 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 01:10:30.372762 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 May 17 01:10:30.372854 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 May 17 01:10:30.372864 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 May 17 01:10:30.340098 systemd[1]: Starting disk-uuid.service... May 17 01:10:30.403427 kernel: ata2.00: Enabling discard_zeroes_data May 17 01:10:30.403439 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 May 17 01:10:30.403484 disk-uuid[691]: Primary Header is updated. May 17 01:10:30.403484 disk-uuid[691]: Secondary Entries is updated. May 17 01:10:30.403484 disk-uuid[691]: Secondary Header is updated. May 17 01:10:30.460402 kernel: ata2.00: Enabling discard_zeroes_data May 17 01:10:30.460412 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 May 17 01:10:30.460419 kernel: ata2.00: Enabling discard_zeroes_data May 17 01:10:30.487359 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 May 17 01:10:31.466399 kernel: ata2.00: Enabling discard_zeroes_data May 17 01:10:31.485285 disk-uuid[692]: The operation has completed successfully. May 17 01:10:31.493413 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 May 17 01:10:31.527890 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 01:10:31.622744 kernel: audit: type=1130 audit(1747444231.534:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:31.622760 kernel: audit: type=1131 audit(1747444231.534:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:31.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:31.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:31.527933 systemd[1]: Finished disk-uuid.service. May 17 01:10:31.651409 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 17 01:10:31.541567 systemd[1]: Starting verity-setup.service... May 17 01:10:31.716496 systemd[1]: Found device dev-mapper-usr.device. May 17 01:10:31.728742 systemd[1]: Mounting sysusr-usr.mount... May 17 01:10:31.739938 systemd[1]: Finished verity-setup.service. May 17 01:10:31.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:31.802299 kernel: audit: type=1130 audit(1747444231.753:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:31.858081 systemd[1]: Mounted sysusr-usr.mount. May 17 01:10:31.874365 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 01:10:31.866672 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 01:10:31.867079 systemd[1]: Starting ignition-setup.service... May 17 01:10:31.963400 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm May 17 01:10:31.963415 kernel: BTRFS info (device sdb6): using free space tree May 17 01:10:31.963422 kernel: BTRFS info (device sdb6): has skinny extents May 17 01:10:31.963429 kernel: BTRFS info (device sdb6): enabling ssd optimizations May 17 01:10:31.874828 systemd[1]: Starting parse-ip-for-networkd.service... May 17 01:10:31.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:31.956686 systemd[1]: Finished parse-ip-for-networkd.service. May 17 01:10:32.077101 kernel: audit: type=1130 audit(1747444231.970:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:32.077115 kernel: audit: type=1130 audit(1747444232.027:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:32.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:31.971879 systemd[1]: Finished ignition-setup.service. May 17 01:10:32.108048 kernel: audit: type=1334 audit(1747444232.084:24): prog-id=9 op=LOAD May 17 01:10:32.084000 audit: BPF prog-id=9 op=LOAD May 17 01:10:32.029013 systemd[1]: Starting ignition-fetch-offline.service... May 17 01:10:32.086130 systemd[1]: Starting systemd-networkd.service... May 17 01:10:32.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:32.121879 systemd-networkd[882]: lo: Link UP May 17 01:10:32.189448 kernel: audit: type=1130 audit(1747444232.122:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:32.150532 ignition[871]: Ignition 2.14.0 May 17 01:10:32.121882 systemd-networkd[882]: lo: Gained carrier May 17 01:10:32.150536 ignition[871]: Stage: fetch-offline May 17 01:10:32.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:32.122183 systemd-networkd[882]: Enumeration completed May 17 01:10:32.350431 kernel: audit: type=1130 audit(1747444232.214:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:32.350449 kernel: audit: type=1130 audit(1747444232.274:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:32.350457 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up May 17 01:10:32.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:32.150563 ignition[871]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 01:10:32.386393 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f1np1: link becomes ready May 17 01:10:32.122252 systemd[1]: Started systemd-networkd.service. May 17 01:10:32.150576 ignition[871]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 May 17 01:10:32.122972 systemd-networkd[882]: enp2s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 01:10:32.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:32.158728 ignition[871]: no config dir at "/usr/lib/ignition/base.platform.d/packet" May 17 01:10:32.123549 systemd[1]: Reached target network.target. May 17 01:10:32.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:32.452473 iscsid[902]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 01:10:32.452473 iscsid[902]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 17 01:10:32.452473 iscsid[902]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 01:10:32.452473 iscsid[902]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 01:10:32.452473 iscsid[902]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 01:10:32.452473 iscsid[902]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 01:10:32.452473 iscsid[902]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 01:10:32.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:32.158796 ignition[871]: parsed url from cmdline: "" May 17 01:10:32.161719 unknown[871]: fetched base config from "system" May 17 01:10:32.158798 ignition[871]: no config URL provided May 17 01:10:32.161723 unknown[871]: fetched user config from "system" May 17 01:10:32.158801 ignition[871]: reading system config file "/usr/lib/ignition/user.ign" May 17 01:10:32.644481 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up May 17 01:10:32.182927 systemd[1]: Starting iscsiuio.service... May 17 01:10:32.158815 ignition[871]: parsing config with SHA512: fb14a19cf216bdbc1d2074137c7d7192359cc13cf0efe78c688744d9ee10d8bfb0a959e62192860b9e6ed9e07c04b6da7b33537c873212844849efd84f5c2911 May 17 01:10:32.196695 systemd[1]: Started iscsiuio.service. May 17 01:10:32.161921 ignition[871]: fetch-offline: fetch-offline passed May 17 01:10:32.215656 systemd[1]: Finished ignition-fetch-offline.service. May 17 01:10:32.161923 ignition[871]: POST message to Packet Timeline May 17 01:10:32.275713 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 17 01:10:32.161928 ignition[871]: POST Status error: resource requires networking May 17 01:10:32.276230 systemd[1]: Starting ignition-kargs.service... May 17 01:10:32.161963 ignition[871]: Ignition finished successfully May 17 01:10:32.351412 systemd-networkd[882]: enp2s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 01:10:32.354852 ignition[891]: Ignition 2.14.0 May 17 01:10:32.365861 systemd[1]: Starting iscsid.service... May 17 01:10:32.354855 ignition[891]: Stage: kargs May 17 01:10:32.393536 systemd[1]: Started iscsid.service. May 17 01:10:32.354912 ignition[891]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 01:10:32.407805 systemd[1]: Starting dracut-initqueue.service... May 17 01:10:32.354921 ignition[891]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 May 17 01:10:32.427473 systemd[1]: Finished dracut-initqueue.service. May 17 01:10:32.356254 ignition[891]: no config dir at "/usr/lib/ignition/base.platform.d/packet" May 17 01:10:32.445365 systemd[1]: Reached target remote-fs-pre.target. May 17 01:10:32.357775 ignition[891]: kargs: kargs passed May 17 01:10:32.460324 systemd[1]: Reached target remote-cryptsetup.target. May 17 01:10:32.357778 ignition[891]: POST message to Packet Timeline May 17 01:10:32.468325 systemd[1]: Reached target remote-fs.target. May 17 01:10:32.357789 ignition[891]: GET https://metadata.packet.net/metadata: attempt #1 May 17 01:10:32.468761 systemd[1]: Starting dracut-pre-mount.service... May 17 01:10:32.361704 ignition[891]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:45876->[::1]:53: read: connection refused May 17 01:10:32.518743 systemd[1]: Finished dracut-pre-mount.service. May 17 01:10:32.562117 ignition[891]: GET https://metadata.packet.net/metadata: attempt #2 May 17 01:10:32.637322 systemd-networkd[882]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 01:10:32.562430 ignition[891]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:41964->[::1]:53: read: connection refused May 17 01:10:32.666082 systemd-networkd[882]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 01:10:32.696803 systemd-networkd[882]: enp2s0f1np1: Link UP May 17 01:10:32.697229 systemd-networkd[882]: enp2s0f1np1: Gained carrier May 17 01:10:32.710823 systemd-networkd[882]: enp2s0f0np0: Link UP May 17 01:10:32.711200 systemd-networkd[882]: eno2: Link UP May 17 01:10:32.711567 systemd-networkd[882]: eno1: Link UP May 17 01:10:32.963069 ignition[891]: GET https://metadata.packet.net/metadata: attempt #3 May 17 01:10:32.964203 ignition[891]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:53066->[::1]:53: read: connection refused May 17 01:10:33.415162 systemd-networkd[882]: enp2s0f0np0: Gained carrier May 17 01:10:33.424585 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f0np0: link becomes ready May 17 01:10:33.504741 systemd-networkd[882]: enp2s0f0np0: DHCPv4 address 147.28.180.77/31, gateway 147.28.180.76 acquired from 145.40.83.140 May 17 01:10:33.764643 ignition[891]: GET https://metadata.packet.net/metadata: attempt #4 May 17 01:10:33.765786 ignition[891]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:36742->[::1]:53: read: connection refused May 17 01:10:34.223781 systemd-networkd[882]: enp2s0f1np1: Gained IPv6LL May 17 01:10:34.671754 systemd-networkd[882]: enp2s0f0np0: Gained IPv6LL May 17 01:10:35.367596 ignition[891]: GET https://metadata.packet.net/metadata: attempt #5 May 17 01:10:35.369094 ignition[891]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:51308->[::1]:53: read: connection refused May 17 01:10:38.569558 ignition[891]: GET https://metadata.packet.net/metadata: attempt #6 May 17 01:10:39.590879 ignition[891]: GET result: OK May 17 01:10:39.946540 ignition[891]: Ignition finished successfully May 17 01:10:39.951167 systemd[1]: Finished ignition-kargs.service. May 17 01:10:40.038812 kernel: kauditd_printk_skb: 3 callbacks suppressed May 17 01:10:40.038831 kernel: audit: type=1130 audit(1747444239.960:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:39.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:39.970639 ignition[918]: Ignition 2.14.0 May 17 01:10:39.963604 systemd[1]: Starting ignition-disks.service... May 17 01:10:39.970643 ignition[918]: Stage: disks May 17 01:10:39.970720 ignition[918]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 01:10:39.970729 ignition[918]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 May 17 01:10:39.973619 ignition[918]: no config dir at "/usr/lib/ignition/base.platform.d/packet" May 17 01:10:39.974098 ignition[918]: disks: disks passed May 17 01:10:39.974102 ignition[918]: POST message to Packet Timeline May 17 01:10:39.974112 ignition[918]: GET https://metadata.packet.net/metadata: attempt #1 May 17 01:10:40.975898 ignition[918]: GET result: OK May 17 01:10:41.367810 ignition[918]: Ignition finished successfully May 17 01:10:41.370794 systemd[1]: Finished ignition-disks.service. May 17 01:10:41.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:41.383825 systemd[1]: Reached target initrd-root-device.target. May 17 01:10:41.447569 kernel: audit: type=1130 audit(1747444241.382:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:41.447526 systemd[1]: Reached target local-fs-pre.target. May 17 01:10:41.462528 systemd[1]: Reached target local-fs.target. May 17 01:10:41.462561 systemd[1]: Reached target sysinit.target. May 17 01:10:41.485529 systemd[1]: Reached target basic.target. May 17 01:10:41.500183 systemd[1]: Starting systemd-fsck-root.service... May 17 01:10:41.522775 systemd-fsck[932]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 17 01:10:41.533919 systemd[1]: Finished systemd-fsck-root.service. May 17 01:10:41.625376 kernel: audit: type=1130 audit(1747444241.541:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:41.625392 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 01:10:41.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:41.544426 systemd[1]: Mounting sysroot.mount... May 17 01:10:41.633974 systemd[1]: Mounted sysroot.mount. May 17 01:10:41.649579 systemd[1]: Reached target initrd-root-fs.target. May 17 01:10:41.656173 systemd[1]: Mounting sysroot-usr.mount... May 17 01:10:41.678299 systemd[1]: Starting flatcar-metadata-hostname.service... May 17 01:10:41.692877 systemd[1]: Starting flatcar-static-network.service... May 17 01:10:41.708542 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 01:10:41.708631 systemd[1]: Reached target ignition-diskful.target. May 17 01:10:41.727559 systemd[1]: Mounted sysroot-usr.mount. May 17 01:10:41.750734 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 01:10:41.886550 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sdb6 scanned by mount (943) May 17 01:10:41.886568 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm May 17 01:10:41.886576 kernel: BTRFS info (device sdb6): using free space tree May 17 01:10:41.886583 kernel: BTRFS info (device sdb6): has skinny extents May 17 01:10:41.886590 kernel: BTRFS info (device sdb6): enabling ssd optimizations May 17 01:10:41.886655 coreos-metadata[940]: May 17 01:10:41.863 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 May 17 01:10:41.948499 kernel: audit: type=1130 audit(1747444241.894:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:41.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:41.948535 coreos-metadata[939]: May 17 01:10:41.859 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 May 17 01:10:41.765497 systemd[1]: Starting initrd-setup-root.service... May 17 01:10:41.855862 systemd[1]: Finished initrd-setup-root.service. May 17 01:10:41.997371 initrd-setup-root[950]: cut: /sysroot/etc/passwd: No such file or directory May 17 01:10:42.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:41.896635 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 01:10:42.068524 kernel: audit: type=1130 audit(1747444242.004:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:42.068539 initrd-setup-root[974]: cut: /sysroot/etc/group: No such file or directory May 17 01:10:41.956948 systemd[1]: Starting ignition-mount.service... May 17 01:10:42.086516 initrd-setup-root[984]: cut: /sysroot/etc/shadow: No such file or directory May 17 01:10:42.097478 ignition[1015]: INFO : Ignition 2.14.0 May 17 01:10:42.097478 ignition[1015]: INFO : Stage: mount May 17 01:10:42.097478 ignition[1015]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 01:10:42.097478 ignition[1015]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 May 17 01:10:42.097478 ignition[1015]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" May 17 01:10:42.097478 ignition[1015]: INFO : mount: mount passed May 17 01:10:42.097478 ignition[1015]: INFO : POST message to Packet Timeline May 17 01:10:42.097478 ignition[1015]: INFO : GET https://metadata.packet.net/metadata: attempt #1 May 17 01:10:41.969927 systemd[1]: Starting sysroot-boot.service... May 17 01:10:42.186584 initrd-setup-root[992]: cut: /sysroot/etc/gshadow: No such file or directory May 17 01:10:41.990051 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 17 01:10:41.990093 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 17 01:10:41.990719 systemd[1]: Finished sysroot-boot.service. May 17 01:10:42.806762 coreos-metadata[940]: May 17 01:10:42.806 INFO Fetch successful May 17 01:10:42.847453 systemd[1]: flatcar-static-network.service: Deactivated successfully. May 17 01:10:42.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:42.847517 systemd[1]: Finished flatcar-static-network.service. May 17 01:10:42.983560 kernel: audit: type=1130 audit(1747444242.856:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:42.983574 kernel: audit: type=1131 audit(1747444242.856:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:42.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:42.983600 coreos-metadata[939]: May 17 01:10:42.916 INFO Fetch successful May 17 01:10:42.983600 coreos-metadata[939]: May 17 01:10:42.945 INFO wrote hostname ci-3510.3.7-n-39494cd0d6 to /sysroot/etc/hostname May 17 01:10:43.064518 kernel: audit: type=1130 audit(1747444242.992:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:42.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:42.945838 systemd[1]: Finished flatcar-metadata-hostname.service. May 17 01:10:43.073536 ignition[1015]: INFO : GET result: OK May 17 01:10:43.449174 ignition[1015]: INFO : Ignition finished successfully May 17 01:10:43.451266 systemd[1]: Finished ignition-mount.service. May 17 01:10:43.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:43.468476 systemd[1]: Starting ignition-files.service... May 17 01:10:43.538399 kernel: audit: type=1130 audit(1747444243.465:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:43.532143 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 01:10:43.595728 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sdb6 scanned by mount (1027) May 17 01:10:43.595743 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm May 17 01:10:43.595753 kernel: BTRFS info (device sdb6): using free space tree May 17 01:10:43.619582 kernel: BTRFS info (device sdb6): has skinny extents May 17 01:10:43.669337 kernel: BTRFS info (device sdb6): enabling ssd optimizations May 17 01:10:43.670687 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 01:10:43.688439 ignition[1046]: INFO : Ignition 2.14.0 May 17 01:10:43.688439 ignition[1046]: INFO : Stage: files May 17 01:10:43.688439 ignition[1046]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 01:10:43.688439 ignition[1046]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 May 17 01:10:43.688439 ignition[1046]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" May 17 01:10:43.688439 ignition[1046]: DEBUG : files: compiled without relabeling support, skipping May 17 01:10:43.688439 ignition[1046]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 01:10:43.688439 ignition[1046]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 01:10:43.690892 unknown[1046]: wrote ssh authorized keys file for user: core May 17 01:10:43.791612 ignition[1046]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 01:10:43.791612 ignition[1046]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 01:10:43.791612 ignition[1046]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 01:10:43.791612 ignition[1046]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 17 01:10:43.791612 ignition[1046]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 17 01:10:43.791612 ignition[1046]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 01:10:43.791612 ignition[1046]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 01:10:43.791612 ignition[1046]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 01:10:43.791612 ignition[1046]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 01:10:43.791612 ignition[1046]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" May 17 01:10:43.791612 ignition[1046]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition May 17 01:10:43.791612 ignition[1046]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3026369006" May 17 01:10:43.791612 ignition[1046]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3026369006": device or resource busy May 17 01:10:43.791612 ignition[1046]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3026369006", trying btrfs: device or resource busy May 17 01:10:43.791612 ignition[1046]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3026369006" May 17 01:10:43.696832 systemd[1]: mnt-oem3026369006.mount: Deactivated successfully. May 17 01:10:44.053561 ignition[1046]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3026369006" May 17 01:10:44.053561 ignition[1046]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem3026369006" May 17 01:10:44.053561 ignition[1046]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem3026369006" May 17 01:10:44.053561 ignition[1046]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" May 17 01:10:44.053561 ignition[1046]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 01:10:44.053561 ignition[1046]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-x86-64.raw: attempt #1 May 17 01:10:44.489986 ignition[1046]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 17 01:10:44.673476 ignition[1046]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 01:10:44.673476 ignition[1046]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" May 17 01:10:44.673476 ignition[1046]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" May 17 01:10:44.673476 ignition[1046]: INFO : files: op(c): [started] processing unit "packet-phone-home.service" May 17 01:10:44.673476 ignition[1046]: INFO : files: op(c): [finished] processing unit "packet-phone-home.service" May 17 01:10:44.673476 ignition[1046]: INFO : files: op(d): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 01:10:44.755648 ignition[1046]: INFO : files: op(d): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 01:10:44.755648 ignition[1046]: INFO : files: op(e): [started] setting preset to enabled for "packet-phone-home.service" May 17 01:10:44.755648 ignition[1046]: INFO : files: op(e): [finished] setting preset to enabled for "packet-phone-home.service" May 17 01:10:44.755648 ignition[1046]: INFO : files: createResultFile: createFiles: op(f): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 01:10:44.755648 ignition[1046]: INFO : files: createResultFile: createFiles: op(f): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 01:10:44.755648 ignition[1046]: INFO : files: files passed May 17 01:10:44.755648 ignition[1046]: INFO : POST message to Packet Timeline May 17 01:10:44.755648 ignition[1046]: INFO : GET https://metadata.packet.net/metadata: attempt #1 May 17 01:10:45.507643 ignition[1046]: INFO : GET result: OK May 17 01:10:45.948870 ignition[1046]: INFO : Ignition finished successfully May 17 01:10:45.957021 systemd[1]: Finished ignition-files.service. May 17 01:10:45.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:45.977953 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 01:10:46.049567 kernel: audit: type=1130 audit(1747444245.971:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:46.039558 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 01:10:46.074508 initrd-setup-root-after-ignition[1078]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 01:10:46.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:46.039877 systemd[1]: Starting ignition-quench.service... May 17 01:10:46.263730 kernel: audit: type=1130 audit(1747444246.083:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:46.263746 kernel: audit: type=1130 audit(1747444246.149:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:46.263754 kernel: audit: type=1131 audit(1747444246.149:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:46.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:46.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:46.056680 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 01:10:46.084703 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 01:10:46.084772 systemd[1]: Finished ignition-quench.service. May 17 01:10:46.419164 kernel: audit: type=1130 audit(1747444246.303:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:46.419178 kernel: audit: type=1131 audit(1747444246.303:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:46.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:46.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:46.150552 systemd[1]: Reached target ignition-complete.target. May 17 01:10:46.272918 systemd[1]: Starting initrd-parse-etc.service... May 17 01:10:46.293143 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 01:10:46.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:46.293188 systemd[1]: Finished initrd-parse-etc.service. May 17 01:10:46.539524 kernel: audit: type=1130 audit(1747444246.467:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:46.304623 systemd[1]: Reached target initrd-fs.target. May 17 01:10:46.427516 systemd[1]: Reached target initrd.target. May 17 01:10:46.427575 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 01:10:46.427944 systemd[1]: Starting dracut-pre-pivot.service... May 17 01:10:46.449649 systemd[1]: Finished dracut-pre-pivot.service. May 17 01:10:46.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:46.468904 systemd[1]: Starting initrd-cleanup.service... May 17 01:10:46.686536 kernel: audit: type=1131 audit(1747444246.604:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:46.535355 systemd[1]: Stopped target nss-lookup.target. May 17 01:10:46.548557 systemd[1]: Stopped target remote-cryptsetup.target. May 17 01:10:46.564573 systemd[1]: Stopped target timers.target. May 17 01:10:46.589609 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 01:10:46.589726 systemd[1]: Stopped dracut-pre-pivot.service. May 17 01:10:46.605844 systemd[1]: Stopped target initrd.target. May 17 01:10:46.679589 systemd[1]: Stopped target basic.target. May 17 01:10:46.693555 systemd[1]: Stopped target ignition-complete.target. May 17 01:10:46.716606 systemd[1]: Stopped target ignition-diskful.target. May 17 01:10:46.732611 systemd[1]: Stopped target initrd-root-device.target. May 17 01:10:46.749706 systemd[1]: Stopped target remote-fs.target. May 17 01:10:46.764871 systemd[1]: Stopped target remote-fs-pre.target. May 17 01:10:46.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:46.779934 systemd[1]: Stopped target sysinit.target. May 17 01:10:46.946539 kernel: audit: type=1131 audit(1747444246.858:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:46.794932 systemd[1]: Stopped target local-fs.target. May 17 01:10:47.016348 kernel: audit: type=1131 audit(1747444246.954:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:46.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:46.811910 systemd[1]: Stopped target local-fs-pre.target. May 17 01:10:47.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:46.828903 systemd[1]: Stopped target swap.target. May 17 01:10:46.844920 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 01:10:46.845315 systemd[1]: Stopped dracut-pre-mount.service. May 17 01:10:46.860144 systemd[1]: Stopped target cryptsetup.target. May 17 01:10:46.938584 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 01:10:47.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:46.938669 systemd[1]: Stopped dracut-initqueue.service. May 17 01:10:47.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:46.955666 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 01:10:47.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:46.955741 systemd[1]: Stopped ignition-fetch-offline.service. May 17 01:10:47.158523 ignition[1095]: INFO : Ignition 2.14.0 May 17 01:10:47.158523 ignition[1095]: INFO : Stage: umount May 17 01:10:47.158523 ignition[1095]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 01:10:47.158523 ignition[1095]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 May 17 01:10:47.158523 ignition[1095]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" May 17 01:10:47.158523 ignition[1095]: INFO : umount: umount passed May 17 01:10:47.158523 ignition[1095]: INFO : POST message to Packet Timeline May 17 01:10:47.158523 ignition[1095]: INFO : GET https://metadata.packet.net/metadata: attempt #1 May 17 01:10:47.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:47.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:47.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:47.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:47.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:47.024546 systemd[1]: Stopped target paths.target. May 17 01:10:47.299566 iscsid[902]: iscsid shutting down. May 17 01:10:47.038552 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 01:10:47.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:47.042346 systemd[1]: Stopped systemd-ask-password-console.path. May 17 01:10:47.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:47.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:47.045613 systemd[1]: Stopped target slices.target. May 17 01:10:47.068573 systemd[1]: Stopped target sockets.target. May 17 01:10:47.084600 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 01:10:47.084744 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 01:10:47.102737 systemd[1]: ignition-files.service: Deactivated successfully. May 17 01:10:47.102925 systemd[1]: Stopped ignition-files.service. May 17 01:10:47.118933 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. May 17 01:10:47.119312 systemd[1]: Stopped flatcar-metadata-hostname.service. May 17 01:10:47.136140 systemd[1]: Stopping ignition-mount.service... May 17 01:10:47.150641 systemd[1]: Stopping iscsid.service... May 17 01:10:47.165534 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 01:10:47.165926 systemd[1]: Stopped kmod-static-nodes.service. May 17 01:10:47.183028 systemd[1]: Stopping sysroot-boot.service... May 17 01:10:47.195541 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 01:10:47.195946 systemd[1]: Stopped systemd-udev-trigger.service. May 17 01:10:47.207026 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 01:10:47.207395 systemd[1]: Stopped dracut-pre-trigger.service. May 17 01:10:47.237637 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 01:10:47.237947 systemd[1]: iscsid.service: Deactivated successfully. May 17 01:10:47.237989 systemd[1]: Stopped iscsid.service. May 17 01:10:47.248953 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 01:10:47.249002 systemd[1]: Stopped sysroot-boot.service. May 17 01:10:47.275892 systemd[1]: iscsid.socket: Deactivated successfully. May 17 01:10:47.275974 systemd[1]: Closed iscsid.socket. May 17 01:10:47.292722 systemd[1]: Stopping iscsiuio.service... May 17 01:10:47.307135 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 01:10:47.307357 systemd[1]: Stopped iscsiuio.service. May 17 01:10:47.321178 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 01:10:47.321408 systemd[1]: Finished initrd-cleanup.service. May 17 01:10:47.340919 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 01:10:47.341013 systemd[1]: Closed iscsiuio.socket. May 17 01:10:48.172192 ignition[1095]: INFO : GET result: OK May 17 01:10:48.691568 ignition[1095]: INFO : Ignition finished successfully May 17 01:10:48.694757 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 01:10:48.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:48.694994 systemd[1]: Stopped ignition-mount.service. May 17 01:10:48.708885 systemd[1]: Stopped target network.target. May 17 01:10:48.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:48.724528 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 01:10:48.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:48.724670 systemd[1]: Stopped ignition-disks.service. May 17 01:10:48.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:48.739626 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 01:10:48.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:48.739751 systemd[1]: Stopped ignition-kargs.service. May 17 01:10:48.754715 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 01:10:48.754867 systemd[1]: Stopped ignition-setup.service. May 17 01:10:48.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:48.771839 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 01:10:48.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:48.850000 audit: BPF prog-id=6 op=UNLOAD May 17 01:10:48.771990 systemd[1]: Stopped initrd-setup-root.service. May 17 01:10:48.788117 systemd[1]: Stopping systemd-networkd.service... May 17 01:10:48.800454 systemd-networkd[882]: enp2s0f1np1: DHCPv6 lease lost May 17 01:10:48.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:48.802707 systemd[1]: Stopping systemd-resolved.service... May 17 01:10:48.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:48.808438 systemd-networkd[882]: enp2s0f0np0: DHCPv6 lease lost May 17 01:10:48.923000 audit: BPF prog-id=9 op=UNLOAD May 17 01:10:48.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:48.817106 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 01:10:48.817372 systemd[1]: Stopped systemd-resolved.service. May 17 01:10:48.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:48.835038 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 01:10:48.835292 systemd[1]: Stopped systemd-networkd.service. May 17 01:10:48.849992 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 01:10:49.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:48.850080 systemd[1]: Closed systemd-networkd.socket. May 17 01:10:49.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:48.870014 systemd[1]: Stopping network-cleanup.service... May 17 01:10:49.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:48.883520 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 01:10:48.883654 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 01:10:49.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:48.900659 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 01:10:49.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:49.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:48.900779 systemd[1]: Stopped systemd-sysctl.service. May 17 01:10:48.916962 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 01:10:48.917106 systemd[1]: Stopped systemd-modules-load.service. May 17 01:10:48.932837 systemd[1]: Stopping systemd-udevd.service... May 17 01:10:48.951380 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 01:10:48.952358 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 01:10:48.952417 systemd[1]: Stopped systemd-udevd.service. May 17 01:10:48.956800 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 01:10:48.956824 systemd[1]: Closed systemd-udevd-control.socket. May 17 01:10:48.976500 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 01:10:48.976525 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 01:10:48.992524 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 01:10:48.992551 systemd[1]: Stopped dracut-pre-udev.service. May 17 01:10:49.007495 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 01:10:49.007531 systemd[1]: Stopped dracut-cmdline.service. May 17 01:10:49.024448 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 01:10:49.024498 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 01:10:49.040559 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 01:10:49.055381 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 01:10:49.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:49.055411 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 01:10:49.073657 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 01:10:49.073714 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 01:10:49.246088 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 01:10:49.246444 systemd[1]: Stopped network-cleanup.service. May 17 01:10:49.256980 systemd[1]: Reached target initrd-switch-root.target. May 17 01:10:49.276134 systemd[1]: Starting initrd-switch-root.service... May 17 01:10:49.315086 systemd[1]: Switching root. May 17 01:10:49.370073 systemd-journald[268]: Journal stopped May 17 01:10:53.231291 systemd-journald[268]: Received SIGTERM from PID 1 (n/a). May 17 01:10:53.231307 kernel: SELinux: Class mctp_socket not defined in policy. May 17 01:10:53.231331 kernel: SELinux: Class anon_inode not defined in policy. May 17 01:10:53.231337 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 01:10:53.231364 kernel: SELinux: policy capability network_peer_controls=1 May 17 01:10:53.231369 kernel: SELinux: policy capability open_perms=1 May 17 01:10:53.231375 kernel: SELinux: policy capability extended_socket_class=1 May 17 01:10:53.231380 kernel: SELinux: policy capability always_check_network=0 May 17 01:10:53.231385 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 01:10:53.231392 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 01:10:53.231397 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 01:10:53.231402 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 01:10:53.231407 systemd[1]: Successfully loaded SELinux policy in 317.792ms. May 17 01:10:53.231414 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 22.382ms. May 17 01:10:53.231423 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 01:10:53.231429 systemd[1]: Detected architecture x86-64. May 17 01:10:53.231435 systemd[1]: Detected first boot. May 17 01:10:53.231441 systemd[1]: Hostname set to . May 17 01:10:53.231447 systemd[1]: Initializing machine ID from random generator. May 17 01:10:53.231453 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 01:10:53.231458 systemd[1]: Populated /etc with preset unit settings. May 17 01:10:53.231465 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 01:10:53.231472 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 01:10:53.231479 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 01:10:53.231485 kernel: kauditd_printk_skb: 49 callbacks suppressed May 17 01:10:53.231490 kernel: audit: type=1334 audit(1747444251.758:92): prog-id=12 op=LOAD May 17 01:10:53.231496 kernel: audit: type=1334 audit(1747444251.758:93): prog-id=3 op=UNLOAD May 17 01:10:53.231502 kernel: audit: type=1334 audit(1747444251.825:94): prog-id=13 op=LOAD May 17 01:10:53.231508 kernel: audit: type=1334 audit(1747444251.847:95): prog-id=14 op=LOAD May 17 01:10:53.231513 kernel: audit: type=1334 audit(1747444251.847:96): prog-id=4 op=UNLOAD May 17 01:10:53.231519 kernel: audit: type=1334 audit(1747444251.847:97): prog-id=5 op=UNLOAD May 17 01:10:53.231524 kernel: audit: type=1334 audit(1747444251.891:98): prog-id=15 op=LOAD May 17 01:10:53.231530 kernel: audit: type=1334 audit(1747444251.891:99): prog-id=12 op=UNLOAD May 17 01:10:53.231535 kernel: audit: type=1334 audit(1747444251.932:100): prog-id=16 op=LOAD May 17 01:10:53.231540 kernel: audit: type=1334 audit(1747444251.973:101): prog-id=17 op=LOAD May 17 01:10:53.231546 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 01:10:53.231553 systemd[1]: Stopped initrd-switch-root.service. May 17 01:10:53.231559 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 01:10:53.231565 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 01:10:53.231572 systemd[1]: Created slice system-addon\x2drun.slice. May 17 01:10:53.231580 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 17 01:10:53.231586 systemd[1]: Created slice system-getty.slice. May 17 01:10:53.231592 systemd[1]: Created slice system-modprobe.slice. May 17 01:10:53.231598 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 01:10:53.231606 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 01:10:53.231612 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 01:10:53.231618 systemd[1]: Created slice user.slice. May 17 01:10:53.231624 systemd[1]: Started systemd-ask-password-console.path. May 17 01:10:53.231630 systemd[1]: Started systemd-ask-password-wall.path. May 17 01:10:53.231637 systemd[1]: Set up automount boot.automount. May 17 01:10:53.231643 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 01:10:53.231649 systemd[1]: Stopped target initrd-switch-root.target. May 17 01:10:53.231655 systemd[1]: Stopped target initrd-fs.target. May 17 01:10:53.231662 systemd[1]: Stopped target initrd-root-fs.target. May 17 01:10:53.231669 systemd[1]: Reached target integritysetup.target. May 17 01:10:53.231675 systemd[1]: Reached target remote-cryptsetup.target. May 17 01:10:53.231681 systemd[1]: Reached target remote-fs.target. May 17 01:10:53.231687 systemd[1]: Reached target slices.target. May 17 01:10:53.231694 systemd[1]: Reached target swap.target. May 17 01:10:53.231700 systemd[1]: Reached target torcx.target. May 17 01:10:53.231707 systemd[1]: Reached target veritysetup.target. May 17 01:10:53.231713 systemd[1]: Listening on systemd-coredump.socket. May 17 01:10:53.231719 systemd[1]: Listening on systemd-initctl.socket. May 17 01:10:53.231726 systemd[1]: Listening on systemd-networkd.socket. May 17 01:10:53.231733 systemd[1]: Listening on systemd-udevd-control.socket. May 17 01:10:53.231740 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 01:10:53.231746 systemd[1]: Listening on systemd-userdbd.socket. May 17 01:10:53.231752 systemd[1]: Mounting dev-hugepages.mount... May 17 01:10:53.231759 systemd[1]: Mounting dev-mqueue.mount... May 17 01:10:53.231765 systemd[1]: Mounting media.mount... May 17 01:10:53.231772 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 01:10:53.231778 systemd[1]: Mounting sys-kernel-debug.mount... May 17 01:10:53.231785 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 01:10:53.231791 systemd[1]: Mounting tmp.mount... May 17 01:10:53.231798 systemd[1]: Starting flatcar-tmpfiles.service... May 17 01:10:53.231805 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 01:10:53.231811 systemd[1]: Starting kmod-static-nodes.service... May 17 01:10:53.231817 systemd[1]: Starting modprobe@configfs.service... May 17 01:10:53.231824 systemd[1]: Starting modprobe@dm_mod.service... May 17 01:10:53.231830 systemd[1]: Starting modprobe@drm.service... May 17 01:10:53.231836 systemd[1]: Starting modprobe@efi_pstore.service... May 17 01:10:53.231843 systemd[1]: Starting modprobe@fuse.service... May 17 01:10:53.231849 kernel: fuse: init (API version 7.34) May 17 01:10:53.231856 systemd[1]: Starting modprobe@loop.service... May 17 01:10:53.231862 kernel: loop: module loaded May 17 01:10:53.231868 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 01:10:53.231875 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 01:10:53.231881 systemd[1]: Stopped systemd-fsck-root.service. May 17 01:10:53.231887 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 01:10:53.231894 systemd[1]: Stopped systemd-fsck-usr.service. May 17 01:10:53.231900 systemd[1]: Stopped systemd-journald.service. May 17 01:10:53.231906 systemd[1]: Starting systemd-journald.service... May 17 01:10:53.231914 systemd[1]: Starting systemd-modules-load.service... May 17 01:10:53.231922 systemd-journald[1246]: Journal started May 17 01:10:53.231946 systemd-journald[1246]: Runtime Journal (/run/log/journal/772f15dfd7394d1c9605ec890a5be042) is 8.0M, max 640.1M, 632.1M free. May 17 01:10:49.778000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 01:10:50.074000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 01:10:50.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 01:10:50.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 01:10:50.076000 audit: BPF prog-id=10 op=LOAD May 17 01:10:50.076000 audit: BPF prog-id=10 op=UNLOAD May 17 01:10:50.076000 audit: BPF prog-id=11 op=LOAD May 17 01:10:50.076000 audit: BPF prog-id=11 op=UNLOAD May 17 01:10:50.165000 audit[1136]: AVC avc: denied { associate } for pid=1136 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 01:10:50.165000 audit[1136]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a58d2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1119 pid=1136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:10:50.165000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 01:10:50.191000 audit[1136]: AVC avc: denied { associate } for pid=1136 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 01:10:50.191000 audit[1136]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a59a9 a2=1ed a3=0 items=2 ppid=1119 pid=1136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:10:50.191000 audit: CWD cwd="/" May 17 01:10:50.191000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:50.191000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:50.191000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 01:10:51.758000 audit: BPF prog-id=12 op=LOAD May 17 01:10:51.758000 audit: BPF prog-id=3 op=UNLOAD May 17 01:10:51.825000 audit: BPF prog-id=13 op=LOAD May 17 01:10:51.847000 audit: BPF prog-id=14 op=LOAD May 17 01:10:51.847000 audit: BPF prog-id=4 op=UNLOAD May 17 01:10:51.847000 audit: BPF prog-id=5 op=UNLOAD May 17 01:10:51.891000 audit: BPF prog-id=15 op=LOAD May 17 01:10:51.891000 audit: BPF prog-id=12 op=UNLOAD May 17 01:10:51.932000 audit: BPF prog-id=16 op=LOAD May 17 01:10:51.973000 audit: BPF prog-id=17 op=LOAD May 17 01:10:51.973000 audit: BPF prog-id=13 op=UNLOAD May 17 01:10:51.973000 audit: BPF prog-id=14 op=UNLOAD May 17 01:10:51.993000 audit: BPF prog-id=18 op=LOAD May 17 01:10:51.993000 audit: BPF prog-id=15 op=UNLOAD May 17 01:10:51.993000 audit: BPF prog-id=19 op=LOAD May 17 01:10:51.993000 audit: BPF prog-id=20 op=LOAD May 17 01:10:51.993000 audit: BPF prog-id=16 op=UNLOAD May 17 01:10:51.993000 audit: BPF prog-id=17 op=UNLOAD May 17 01:10:51.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:52.033000 audit: BPF prog-id=18 op=UNLOAD May 17 01:10:52.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:52.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.202000 audit: BPF prog-id=21 op=LOAD May 17 01:10:53.203000 audit: BPF prog-id=22 op=LOAD May 17 01:10:53.203000 audit: BPF prog-id=23 op=LOAD May 17 01:10:53.203000 audit: BPF prog-id=19 op=UNLOAD May 17 01:10:53.203000 audit: BPF prog-id=20 op=UNLOAD May 17 01:10:53.227000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 01:10:53.227000 audit[1246]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe9e571be0 a2=4000 a3=7ffe9e571c7c items=0 ppid=1 pid=1246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:10:53.227000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 01:10:51.757569 systemd[1]: Queued start job for default target multi-user.target. May 17 01:10:50.162554 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2025-05-17T01:10:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 01:10:51.757576 systemd[1]: Unnecessary job was removed for dev-sdb6.device. May 17 01:10:50.163213 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2025-05-17T01:10:50Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 01:10:51.994859 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 01:10:50.163245 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2025-05-17T01:10:50Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 01:10:50.163288 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2025-05-17T01:10:50Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 01:10:50.163323 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2025-05-17T01:10:50Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 01:10:50.163374 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2025-05-17T01:10:50Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 01:10:50.163395 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2025-05-17T01:10:50Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 01:10:50.163677 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2025-05-17T01:10:50Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 01:10:50.163742 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2025-05-17T01:10:50Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 01:10:50.163763 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2025-05-17T01:10:50Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 01:10:50.165636 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2025-05-17T01:10:50Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 01:10:50.165697 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2025-05-17T01:10:50Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 01:10:50.165729 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2025-05-17T01:10:50Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 01:10:50.165752 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2025-05-17T01:10:50Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 01:10:50.165781 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2025-05-17T01:10:50Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 01:10:50.165803 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2025-05-17T01:10:50Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 01:10:51.361854 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2025-05-17T01:10:51Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 01:10:51.361998 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2025-05-17T01:10:51Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 01:10:51.362056 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2025-05-17T01:10:51Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 01:10:51.362154 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2025-05-17T01:10:51Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 01:10:51.362183 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2025-05-17T01:10:51Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 01:10:51.362217 /usr/lib/systemd/system-generators/torcx-generator[1136]: time="2025-05-17T01:10:51Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 01:10:53.262504 systemd[1]: Starting systemd-network-generator.service... May 17 01:10:53.284336 systemd[1]: Starting systemd-remount-fs.service... May 17 01:10:53.306346 systemd[1]: Starting systemd-udev-trigger.service... May 17 01:10:53.338840 systemd[1]: verity-setup.service: Deactivated successfully. May 17 01:10:53.338861 systemd[1]: Stopped verity-setup.service. May 17 01:10:53.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.373341 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 01:10:53.387350 systemd[1]: Started systemd-journald.service. May 17 01:10:53.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.395852 systemd[1]: Mounted dev-hugepages.mount. May 17 01:10:53.403560 systemd[1]: Mounted dev-mqueue.mount. May 17 01:10:53.410561 systemd[1]: Mounted media.mount. May 17 01:10:53.417568 systemd[1]: Mounted sys-kernel-debug.mount. May 17 01:10:53.426554 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 01:10:53.435535 systemd[1]: Mounted tmp.mount. May 17 01:10:53.442613 systemd[1]: Finished flatcar-tmpfiles.service. May 17 01:10:53.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.451667 systemd[1]: Finished kmod-static-nodes.service. May 17 01:10:53.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.460645 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 01:10:53.460753 systemd[1]: Finished modprobe@configfs.service. May 17 01:10:53.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.469744 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 01:10:53.469882 systemd[1]: Finished modprobe@dm_mod.service. May 17 01:10:53.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.478794 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 01:10:53.478954 systemd[1]: Finished modprobe@drm.service. May 17 01:10:53.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.487970 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 01:10:53.488210 systemd[1]: Finished modprobe@efi_pstore.service. May 17 01:10:53.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.497184 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 01:10:53.497512 systemd[1]: Finished modprobe@fuse.service. May 17 01:10:53.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.506131 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 01:10:53.506462 systemd[1]: Finished modprobe@loop.service. May 17 01:10:53.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.515143 systemd[1]: Finished systemd-modules-load.service. May 17 01:10:53.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.524108 systemd[1]: Finished systemd-network-generator.service. May 17 01:10:53.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.533108 systemd[1]: Finished systemd-remount-fs.service. May 17 01:10:53.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.542123 systemd[1]: Finished systemd-udev-trigger.service. May 17 01:10:53.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.551595 systemd[1]: Reached target network-pre.target. May 17 01:10:53.564050 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 01:10:53.574968 systemd[1]: Mounting sys-kernel-config.mount... May 17 01:10:53.582553 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 01:10:53.585658 systemd[1]: Starting systemd-hwdb-update.service... May 17 01:10:53.592821 systemd[1]: Starting systemd-journal-flush.service... May 17 01:10:53.595943 systemd-journald[1246]: Time spent on flushing to /var/log/journal/772f15dfd7394d1c9605ec890a5be042 is 14.992ms for 1585 entries. May 17 01:10:53.595943 systemd-journald[1246]: System Journal (/var/log/journal/772f15dfd7394d1c9605ec890a5be042) is 8.0M, max 195.6M, 187.6M free. May 17 01:10:53.631633 systemd-journald[1246]: Received client request to flush runtime journal. May 17 01:10:53.611397 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 01:10:53.611862 systemd[1]: Starting systemd-random-seed.service... May 17 01:10:53.620435 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 01:10:53.620931 systemd[1]: Starting systemd-sysctl.service... May 17 01:10:53.627931 systemd[1]: Starting systemd-sysusers.service... May 17 01:10:53.635908 systemd[1]: Starting systemd-udev-settle.service... May 17 01:10:53.644651 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 01:10:53.653474 systemd[1]: Mounted sys-kernel-config.mount. May 17 01:10:53.661529 systemd[1]: Finished systemd-journal-flush.service. May 17 01:10:53.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.669535 systemd[1]: Finished systemd-random-seed.service. May 17 01:10:53.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.677506 systemd[1]: Finished systemd-sysctl.service. May 17 01:10:53.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.685496 systemd[1]: Finished systemd-sysusers.service. May 17 01:10:53.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.694552 systemd[1]: Reached target first-boot-complete.target. May 17 01:10:53.702645 udevadm[1262]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 17 01:10:53.902958 systemd[1]: Finished systemd-hwdb-update.service. May 17 01:10:53.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.912000 audit: BPF prog-id=24 op=LOAD May 17 01:10:53.913000 audit: BPF prog-id=25 op=LOAD May 17 01:10:53.913000 audit: BPF prog-id=7 op=UNLOAD May 17 01:10:53.913000 audit: BPF prog-id=8 op=UNLOAD May 17 01:10:53.915725 systemd[1]: Starting systemd-udevd.service... May 17 01:10:53.931616 systemd-udevd[1263]: Using default interface naming scheme 'v252'. May 17 01:10:53.947874 systemd[1]: Started systemd-udevd.service. May 17 01:10:53.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:53.958959 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. May 17 01:10:53.958000 audit: BPF prog-id=26 op=LOAD May 17 01:10:53.960364 systemd[1]: Starting systemd-networkd.service... May 17 01:10:53.991822 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 May 17 01:10:53.991883 kernel: ACPI: button: Sleep Button [SLPB] May 17 01:10:53.991900 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 May 17 01:10:53.990000 audit: BPF prog-id=27 op=LOAD May 17 01:10:54.006000 audit: BPF prog-id=28 op=LOAD May 17 01:10:54.007000 audit: BPF prog-id=29 op=LOAD May 17 01:10:54.008878 systemd[1]: Starting systemd-userdbd.service... May 17 01:10:54.013301 kernel: IPMI message handler: version 39.2 May 17 01:10:54.013331 kernel: mousedev: PS/2 mouse device common for all mice May 17 01:10:54.013345 kernel: ACPI: button: Power Button [PWRF] May 17 01:10:54.006000 audit[1268]: AVC avc: denied { confidentiality } for pid=1268 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 01:10:54.067307 kernel: ipmi device interface May 17 01:10:54.006000 audit[1268]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558f218357d0 a1=4d9cc a2=7f31e4f3bbc5 a3=5 items=42 ppid=1263 pid=1268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:10:54.006000 audit: CWD cwd="/" May 17 01:10:54.006000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=1 name=(null) inode=20757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=2 name=(null) inode=20757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=3 name=(null) inode=20758 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=4 name=(null) inode=20757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=5 name=(null) inode=20759 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=6 name=(null) inode=20757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=7 name=(null) inode=20760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=8 name=(null) inode=20760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=9 name=(null) inode=20761 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=10 name=(null) inode=20760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=11 name=(null) inode=20762 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=12 name=(null) inode=20760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=13 name=(null) inode=20763 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=14 name=(null) inode=20760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=15 name=(null) inode=20764 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=16 name=(null) inode=20760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=17 name=(null) inode=20765 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=18 name=(null) inode=20757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=19 name=(null) inode=20766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=20 name=(null) inode=20766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=21 name=(null) inode=20767 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=22 name=(null) inode=20766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=23 name=(null) inode=20768 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=24 name=(null) inode=20766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=25 name=(null) inode=20769 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=26 name=(null) inode=20766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=27 name=(null) inode=20770 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=28 name=(null) inode=20766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=29 name=(null) inode=20771 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=30 name=(null) inode=20757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=31 name=(null) inode=20772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=32 name=(null) inode=20772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=33 name=(null) inode=20773 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=34 name=(null) inode=20772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=35 name=(null) inode=20774 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=36 name=(null) inode=20772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=37 name=(null) inode=20775 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=38 name=(null) inode=20772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=39 name=(null) inode=20776 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=40 name=(null) inode=20772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PATH item=41 name=(null) inode=20777 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:10:54.006000 audit: PROCTITLE proctitle="(udev-worker)" May 17 01:10:54.084323 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 01:10:54.097795 systemd[1]: Started systemd-userdbd.service. May 17 01:10:54.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:54.131305 kernel: ipmi_si: IPMI System Interface driver May 17 01:10:54.131355 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface May 17 01:10:54.160737 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface May 17 01:10:54.160835 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS May 17 01:10:54.257131 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set May 17 01:10:54.274163 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 May 17 01:10:54.274178 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt May 17 01:10:54.274300 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine May 17 01:10:54.274316 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) May 17 01:10:54.274396 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI May 17 01:10:54.346626 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 May 17 01:10:54.346715 kernel: iTCO_vendor_support: vendor-support=0 May 17 01:10:54.346729 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI May 17 01:10:54.346799 kernel: ipmi_si: Adding ACPI-specified kcs state machine May 17 01:10:54.339503 systemd-networkd[1311]: bond0: netdev ready May 17 01:10:54.341635 systemd-networkd[1311]: lo: Link UP May 17 01:10:54.341637 systemd-networkd[1311]: lo: Gained carrier May 17 01:10:54.342099 systemd-networkd[1311]: Enumeration completed May 17 01:10:54.342187 systemd[1]: Started systemd-networkd.service. May 17 01:10:54.342441 systemd-networkd[1311]: bond0: Configuring with /etc/systemd/network/05-bond0.network. May 17 01:10:54.362078 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 May 17 01:10:54.362096 systemd-networkd[1311]: enp2s0f1np1: Configuring with /etc/systemd/network/10-04:3f:72:d9:a2:b5.network. May 17 01:10:54.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:54.402305 kernel: iTCO_wdt iTCO_wdt: unable to reset NO_REBOOT flag, device disabled by hardware/BIOS May 17 01:10:54.423305 kernel: intel_rapl_common: Found RAPL domain package May 17 01:10:54.423366 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. May 17 01:10:54.456323 kernel: intel_rapl_common: Found RAPL domain core May 17 01:10:54.472301 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b11, dev_id: 0x20) May 17 01:10:54.472406 kernel: intel_rapl_common: Found RAPL domain dram May 17 01:10:54.566301 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up May 17 01:10:54.588336 kernel: bond0: (slave enp2s0f1np1): Enslaving as a backup interface with an up link May 17 01:10:54.588787 systemd-networkd[1311]: enp2s0f0np0: Configuring with /etc/systemd/network/10-04:3f:72:d9:a2:b4.network. May 17 01:10:54.641346 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized May 17 01:10:54.658372 kernel: ipmi_ssif: IPMI SSIF Interface driver May 17 01:10:54.658398 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond May 17 01:10:54.802350 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up May 17 01:10:54.802896 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond May 17 01:10:54.828356 kernel: bond0: (slave enp2s0f0np0): Enslaving as a backup interface with an up link May 17 01:10:54.867371 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready May 17 01:10:54.882914 systemd-networkd[1311]: bond0: Link UP May 17 01:10:54.883116 systemd-networkd[1311]: enp2s0f1np1: Link UP May 17 01:10:54.883253 systemd-networkd[1311]: enp2s0f1np1: Gained carrier May 17 01:10:54.884259 systemd-networkd[1311]: enp2s0f1np1: Reconfiguring with /etc/systemd/network/10-04:3f:72:d9:a2:b4.network. May 17 01:10:54.940482 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex May 17 01:10:54.940506 kernel: bond0: active interface up! May 17 01:10:54.959652 systemd[1]: Finished systemd-udev-settle.service. May 17 01:10:54.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:54.968148 systemd[1]: Starting lvm2-activation-early.service... May 17 01:10:54.983686 lvm[1366]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 01:10:55.012747 systemd[1]: Finished lvm2-activation-early.service. May 17 01:10:55.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:55.021441 systemd[1]: Reached target cryptsetup.target. May 17 01:10:55.029902 systemd[1]: Starting lvm2-activation.service... May 17 01:10:55.032089 lvm[1367]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 01:10:55.069298 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.092302 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.115297 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.116733 systemd[1]: Finished lvm2-activation.service. May 17 01:10:55.137298 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:55.154419 systemd[1]: Reached target local-fs-pre.target. May 17 01:10:55.160297 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.178381 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 01:10:55.178415 systemd[1]: Reached target local-fs.target. May 17 01:10:55.183296 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.200335 systemd[1]: Reached target machines.target. May 17 01:10:55.205296 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.223920 systemd[1]: Starting ldconfig.service... May 17 01:10:55.227296 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.243774 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 01:10:55.243796 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 01:10:55.244488 systemd[1]: Starting systemd-boot-update.service... May 17 01:10:55.249296 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.264977 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 01:10:55.270276 systemd[1]: Starting systemd-machine-id-commit.service... May 17 01:10:55.270327 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.270811 systemd[1]: Starting systemd-sysext.service... May 17 01:10:55.270986 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1369 (bootctl) May 17 01:10:55.271568 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 01:10:55.281923 systemd[1]: Unmounting usr-share-oem.mount... May 17 01:10:55.291345 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.312298 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.332341 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.333074 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 01:10:55.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:55.333244 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 01:10:55.333332 systemd[1]: Unmounted usr-share-oem.mount. May 17 01:10:55.352336 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.371353 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.391328 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.391352 kernel: loop0: detected capacity change from 0 to 229808 May 17 01:10:55.406329 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.443303 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.445696 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 01:10:55.446007 systemd[1]: Finished systemd-machine-id-commit.service. May 17 01:10:55.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:55.463298 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.463321 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 01:10:55.479298 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.487705 systemd-fsck[1378]: fsck.fat 4.2 (2021-01-31) May 17 01:10:55.487705 systemd-fsck[1378]: /dev/sdb1: 790 files, 120726/258078 clusters May 17 01:10:55.488374 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 01:10:55.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:55.516706 systemd[1]: Mounting boot.mount... May 17 01:10:55.517333 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.533244 systemd[1]: Mounted boot.mount. May 17 01:10:55.537356 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.557300 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.562937 systemd[1]: Finished systemd-boot-update.service. May 17 01:10:55.575302 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:55.593298 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.593322 kernel: loop1: detected capacity change from 0 to 229808 May 17 01:10:55.607301 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.620260 (sd-sysext)[1383]: Using extensions 'kubernetes'. May 17 01:10:55.620441 (sd-sysext)[1383]: Merged extensions into '/usr'. May 17 01:10:55.632459 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 01:10:55.633164 systemd[1]: Mounting usr-share-oem.mount... May 17 01:10:55.642354 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.657509 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 01:10:55.658163 systemd[1]: Starting modprobe@dm_mod.service... May 17 01:10:55.661359 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.662847 ldconfig[1368]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 01:10:55.676933 systemd[1]: Starting modprobe@efi_pstore.service... May 17 01:10:55.679347 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.694912 systemd[1]: Starting modprobe@loop.service... May 17 01:10:55.698361 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.713409 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 01:10:55.713478 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 01:10:55.713543 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 01:10:55.715236 systemd[1]: Finished ldconfig.service. May 17 01:10:55.717297 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:55.733532 systemd[1]: Mounted usr-share-oem.mount. May 17 01:10:55.735480 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.751563 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 01:10:55.751625 systemd[1]: Finished modprobe@dm_mod.service. May 17 01:10:55.753359 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.769339 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:55.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:55.770607 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 01:10:55.770668 systemd[1]: Finished modprobe@efi_pstore.service. May 17 01:10:55.786349 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:55.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:55.797156 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 01:10:55.797214 systemd[1]: Finished modprobe@loop.service. May 17 01:10:55.802338 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.819351 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:55.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:55.819615 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 01:10:55.819675 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 01:10:55.820168 systemd[1]: Finished systemd-sysext.service. May 17 01:10:55.835343 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:55.846510 systemd[1]: Starting ensure-sysext.service... May 17 01:10:55.851334 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.866892 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 01:10:55.868361 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.877351 systemd-tmpfiles[1390]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 01:10:55.880031 systemd-tmpfiles[1390]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 01:10:55.884782 systemd-tmpfiles[1390]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 01:10:55.885350 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.885585 systemd[1]: Reloading. May 17 01:10:55.900344 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.909114 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-05-17T01:10:55Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 01:10:55.909136 /usr/lib/systemd/system-generators/torcx-generator[1409]: time="2025-05-17T01:10:55Z" level=info msg="torcx already run" May 17 01:10:55.914302 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.928341 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.942370 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.955361 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.962690 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 01:10:55.962698 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 01:10:55.968373 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.969092 systemd-networkd[1311]: enp2s0f0np0: Link UP May 17 01:10:55.969273 systemd-networkd[1311]: bond0: Gained carrier May 17 01:10:55.969367 systemd-networkd[1311]: enp2s0f0np0: Gained carrier May 17 01:10:55.974171 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 01:10:55.991126 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms May 17 01:10:55.991153 kernel: bond0: (slave enp2s0f1np1): invalid new link 1 on slave May 17 01:10:56.004299 kernel: bond0: (slave enp2s0f0np0): link status definitely up, 10000 Mbps full duplex May 17 01:10:56.004382 systemd-networkd[1311]: enp2s0f1np1: Link DOWN May 17 01:10:56.004385 systemd-networkd[1311]: enp2s0f1np1: Lost carrier May 17 01:10:56.017000 audit: BPF prog-id=30 op=LOAD May 17 01:10:56.017000 audit: BPF prog-id=27 op=UNLOAD May 17 01:10:56.017000 audit: BPF prog-id=31 op=LOAD May 17 01:10:56.017000 audit: BPF prog-id=32 op=LOAD May 17 01:10:56.017000 audit: BPF prog-id=28 op=UNLOAD May 17 01:10:56.017000 audit: BPF prog-id=29 op=UNLOAD May 17 01:10:56.017000 audit: BPF prog-id=33 op=LOAD May 17 01:10:56.017000 audit: BPF prog-id=26 op=UNLOAD May 17 01:10:56.018000 audit: BPF prog-id=34 op=LOAD May 17 01:10:56.018000 audit: BPF prog-id=21 op=UNLOAD May 17 01:10:56.018000 audit: BPF prog-id=35 op=LOAD May 17 01:10:56.018000 audit: BPF prog-id=36 op=LOAD May 17 01:10:56.018000 audit: BPF prog-id=22 op=UNLOAD May 17 01:10:56.018000 audit: BPF prog-id=23 op=UNLOAD May 17 01:10:56.019000 audit: BPF prog-id=37 op=LOAD May 17 01:10:56.020000 audit: BPF prog-id=38 op=LOAD May 17 01:10:56.020000 audit: BPF prog-id=24 op=UNLOAD May 17 01:10:56.020000 audit: BPF prog-id=25 op=UNLOAD May 17 01:10:56.022363 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 01:10:56.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:10:56.032285 systemd[1]: Starting audit-rules.service... May 17 01:10:56.039880 systemd[1]: Starting clean-ca-certificates.service... May 17 01:10:56.049024 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 01:10:56.049000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 01:10:56.049000 audit[1488]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffebe4801e0 a2=420 a3=0 items=0 ppid=1471 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:10:56.049000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 01:10:56.051329 augenrules[1488]: No rules May 17 01:10:56.059378 systemd[1]: Starting systemd-resolved.service... May 17 01:10:56.068345 systemd[1]: Starting systemd-timesyncd.service... May 17 01:10:56.076873 systemd[1]: Starting systemd-update-utmp.service... May 17 01:10:56.084629 systemd[1]: Finished audit-rules.service. May 17 01:10:56.092490 systemd[1]: Finished clean-ca-certificates.service. May 17 01:10:56.101526 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 01:10:56.114770 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 01:10:56.115550 systemd[1]: Starting modprobe@dm_mod.service... May 17 01:10:56.122966 systemd[1]: Starting modprobe@efi_pstore.service... May 17 01:10:56.129957 systemd[1]: Starting modprobe@loop.service... May 17 01:10:56.136390 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 01:10:56.136493 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 01:10:56.137238 systemd[1]: Starting systemd-update-done.service... May 17 01:10:56.142543 systemd-resolved[1493]: Positive Trust Anchors: May 17 01:10:56.142551 systemd-resolved[1493]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 01:10:56.142571 systemd-resolved[1493]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 01:10:56.144397 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 01:10:56.145218 systemd[1]: Started systemd-timesyncd.service. May 17 01:10:56.146621 systemd-resolved[1493]: Using system hostname 'ci-3510.3.7-n-39494cd0d6'. May 17 01:10:56.154803 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 01:10:56.154874 systemd[1]: Finished modprobe@dm_mod.service. May 17 01:10:56.164671 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 01:10:56.164735 systemd[1]: Finished modprobe@efi_pstore.service. May 17 01:10:56.172136 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 01:10:56.172200 systemd[1]: Finished modprobe@loop.service. May 17 01:10:56.180685 systemd[1]: Finished systemd-update-done.service. May 17 01:10:56.189400 systemd[1]: Finished systemd-update-utmp.service. May 17 01:10:56.198942 systemd[1]: Reached target time-set.target. May 17 01:10:56.207545 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 01:10:56.208218 systemd[1]: Starting modprobe@dm_mod.service... May 17 01:10:56.215941 systemd[1]: Starting modprobe@efi_pstore.service... May 17 01:10:56.228099 systemd[1]: Starting modprobe@loop.service... May 17 01:10:56.231329 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up May 17 01:10:56.244299 kernel: bond0: (slave enp2s0f1np1): link status up again after 200 ms May 17 01:10:56.244329 kernel: bond0: (slave enp2s0f1np1): speed changed to 0 on port 1 May 17 01:10:56.250599 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 01:10:56.250669 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 01:10:56.250727 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 01:10:56.251239 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 01:10:56.251310 systemd[1]: Finished modprobe@dm_mod.service. May 17 01:10:56.254346 kernel: bond0: (slave enp2s0f1np1): link status up again after 200 ms May 17 01:10:56.254410 systemd-networkd[1311]: enp2s0f1np1: Link UP May 17 01:10:56.255812 systemd-networkd[1311]: enp2s0f1np1: Gained carrier May 17 01:10:56.279364 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex May 17 01:10:56.285524 systemd[1]: Started systemd-resolved.service. May 17 01:10:56.293570 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 01:10:56.293630 systemd[1]: Finished modprobe@efi_pstore.service. May 17 01:10:56.301590 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 01:10:56.301650 systemd[1]: Finished modprobe@loop.service. May 17 01:10:56.310639 systemd[1]: Reached target network.target. May 17 01:10:56.318434 systemd[1]: Reached target nss-lookup.target. May 17 01:10:56.326542 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 01:10:56.327117 systemd[1]: Starting modprobe@dm_mod.service... May 17 01:10:56.333894 systemd[1]: Starting modprobe@drm.service... May 17 01:10:56.340903 systemd[1]: Starting modprobe@efi_pstore.service... May 17 01:10:56.347900 systemd[1]: Starting modprobe@loop.service... May 17 01:10:56.355416 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 01:10:56.355484 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 01:10:56.356077 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 01:10:56.364387 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 01:10:56.365944 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 01:10:56.366006 systemd[1]: Finished modprobe@dm_mod.service. May 17 01:10:56.374587 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 01:10:56.374647 systemd[1]: Finished modprobe@drm.service. May 17 01:10:56.382572 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 01:10:56.382633 systemd[1]: Finished modprobe@efi_pstore.service. May 17 01:10:56.390574 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 01:10:56.390633 systemd[1]: Finished modprobe@loop.service. May 17 01:10:56.398630 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 01:10:56.398682 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 01:10:56.398714 systemd[1]: Reached target sysinit.target. May 17 01:10:56.406441 systemd[1]: Started motdgen.path. May 17 01:10:56.413399 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 01:10:56.423453 systemd[1]: Started logrotate.timer. May 17 01:10:56.430429 systemd[1]: Started mdadm.timer. May 17 01:10:56.437383 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 01:10:56.445374 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 01:10:56.445389 systemd[1]: Reached target paths.target. May 17 01:10:56.452367 systemd[1]: Reached target timers.target. May 17 01:10:56.459501 systemd[1]: Listening on dbus.socket. May 17 01:10:56.466804 systemd[1]: Starting docker.socket... May 17 01:10:56.474770 systemd[1]: Listening on sshd.socket. May 17 01:10:56.481444 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 01:10:56.481470 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 01:10:56.481483 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 01:10:56.481770 systemd[1]: Finished ensure-sysext.service. May 17 01:10:56.490460 systemd[1]: Listening on docker.socket. May 17 01:10:56.497791 systemd[1]: Reached target sockets.target. May 17 01:10:56.506379 systemd[1]: Reached target basic.target. May 17 01:10:56.513384 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 01:10:56.513400 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 01:10:56.513856 systemd[1]: Starting containerd.service... May 17 01:10:56.520808 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 17 01:10:56.529886 systemd[1]: Starting coreos-metadata.service... May 17 01:10:56.536936 systemd[1]: Starting dbus.service... May 17 01:10:56.542910 systemd[1]: Starting enable-oem-cloudinit.service... May 17 01:10:56.547734 jq[1520]: false May 17 01:10:56.550113 systemd[1]: Starting extend-filesystems.service... May 17 01:10:56.550992 coreos-metadata[1513]: May 17 01:10:56.550 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 May 17 01:10:56.555424 dbus-daemon[1519]: [system] SELinux support is enabled May 17 01:10:56.557430 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 01:10:56.558009 systemd[1]: Starting motdgen.service... May 17 01:10:56.559035 extend-filesystems[1521]: Found loop1 May 17 01:10:56.559035 extend-filesystems[1521]: Found sda May 17 01:10:56.581062 extend-filesystems[1521]: Found sdb May 17 01:10:56.581062 extend-filesystems[1521]: Found sdb1 May 17 01:10:56.581062 extend-filesystems[1521]: Found sdb2 May 17 01:10:56.581062 extend-filesystems[1521]: Found sdb3 May 17 01:10:56.581062 extend-filesystems[1521]: Found usr May 17 01:10:56.581062 extend-filesystems[1521]: Found sdb4 May 17 01:10:56.581062 extend-filesystems[1521]: Found sdb6 May 17 01:10:56.581062 extend-filesystems[1521]: Found sdb7 May 17 01:10:56.581062 extend-filesystems[1521]: Found sdb9 May 17 01:10:56.581062 extend-filesystems[1521]: Checking size of /dev/sdb9 May 17 01:10:56.581062 extend-filesystems[1521]: Resized partition /dev/sdb9 May 17 01:10:56.689404 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks May 17 01:10:56.565188 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 01:10:56.689465 coreos-metadata[1516]: May 17 01:10:56.560 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 May 17 01:10:56.689593 extend-filesystems[1537]: resize2fs 1.46.5 (30-Dec-2021) May 17 01:10:56.594005 systemd[1]: Starting sshd-keygen.service... May 17 01:10:56.613739 systemd[1]: Starting systemd-logind.service... May 17 01:10:56.631391 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 01:10:56.631937 systemd[1]: Starting tcsd.service... May 17 01:10:56.709650 update_engine[1549]: I0517 01:10:56.694344 1549 main.cc:92] Flatcar Update Engine starting May 17 01:10:56.709650 update_engine[1549]: I0517 01:10:56.697345 1549 update_check_scheduler.cc:74] Next update check in 8m41s May 17 01:10:56.640750 systemd-logind[1547]: Watching system buttons on /dev/input/event3 (Power Button) May 17 01:10:56.709874 jq[1550]: true May 17 01:10:56.640759 systemd-logind[1547]: Watching system buttons on /dev/input/event2 (Sleep Button) May 17 01:10:56.640769 systemd-logind[1547]: Watching system buttons on /dev/input/event0 (HID 0557:2419) May 17 01:10:56.640912 systemd-logind[1547]: New seat seat0. May 17 01:10:56.649628 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 01:10:56.650008 systemd[1]: Starting update-engine.service... May 17 01:10:56.669021 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 01:10:56.675730 systemd[1]: Started dbus.service. May 17 01:10:56.703111 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 01:10:56.703203 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 01:10:56.703360 systemd[1]: motdgen.service: Deactivated successfully. May 17 01:10:56.703442 systemd[1]: Finished motdgen.service. May 17 01:10:56.716624 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 01:10:56.716704 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 01:10:56.727085 jq[1552]: true May 17 01:10:56.728173 dbus-daemon[1519]: [system] Successfully activated service 'org.freedesktop.systemd1' May 17 01:10:56.734098 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. May 17 01:10:56.734196 systemd[1]: Condition check resulted in tcsd.service being skipped. May 17 01:10:56.734272 systemd[1]: Started systemd-logind.service. May 17 01:10:56.736214 env[1553]: time="2025-05-17T01:10:56.736192124Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 01:10:56.745566 env[1553]: time="2025-05-17T01:10:56.745522172Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 01:10:56.745611 env[1553]: time="2025-05-17T01:10:56.745599280Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 01:10:56.746312 env[1553]: time="2025-05-17T01:10:56.746263887Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 01:10:56.746312 env[1553]: time="2025-05-17T01:10:56.746279617Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 01:10:56.747386 env[1553]: time="2025-05-17T01:10:56.747344035Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 01:10:56.747386 env[1553]: time="2025-05-17T01:10:56.747356657Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 01:10:56.747386 env[1553]: time="2025-05-17T01:10:56.747364468Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 01:10:56.747386 env[1553]: time="2025-05-17T01:10:56.747370541Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 01:10:56.747488 env[1553]: time="2025-05-17T01:10:56.747414386Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 01:10:56.748421 systemd[1]: Started update-engine.service. May 17 01:10:56.749418 env[1553]: time="2025-05-17T01:10:56.749375303Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 01:10:56.749458 env[1553]: time="2025-05-17T01:10:56.749447341Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 01:10:56.749491 env[1553]: time="2025-05-17T01:10:56.749458638Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 01:10:56.749491 env[1553]: time="2025-05-17T01:10:56.749485982Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 01:10:56.749554 env[1553]: time="2025-05-17T01:10:56.749494034Z" level=info msg="metadata content store policy set" policy=shared May 17 01:10:56.753697 bash[1578]: Updated "/home/core/.ssh/authorized_keys" May 17 01:10:56.757490 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 01:10:56.757896 env[1553]: time="2025-05-17T01:10:56.757857685Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 01:10:56.757896 env[1553]: time="2025-05-17T01:10:56.757872936Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 01:10:56.757896 env[1553]: time="2025-05-17T01:10:56.757881562Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 01:10:56.757959 env[1553]: time="2025-05-17T01:10:56.757898857Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 01:10:56.757959 env[1553]: time="2025-05-17T01:10:56.757906896Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 01:10:56.757959 env[1553]: time="2025-05-17T01:10:56.757914457Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 01:10:56.757959 env[1553]: time="2025-05-17T01:10:56.757921046Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 01:10:56.757959 env[1553]: time="2025-05-17T01:10:56.757929230Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 01:10:56.757959 env[1553]: time="2025-05-17T01:10:56.757939095Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 01:10:56.757959 env[1553]: time="2025-05-17T01:10:56.757946472Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 01:10:56.757959 env[1553]: time="2025-05-17T01:10:56.757953239Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 01:10:56.758082 env[1553]: time="2025-05-17T01:10:56.757959762Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 01:10:56.758082 env[1553]: time="2025-05-17T01:10:56.758007103Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 01:10:56.758082 env[1553]: time="2025-05-17T01:10:56.758053867Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 01:10:56.758190 env[1553]: time="2025-05-17T01:10:56.758182358Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 01:10:56.758211 env[1553]: time="2025-05-17T01:10:56.758196892Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 01:10:56.758211 env[1553]: time="2025-05-17T01:10:56.758204257Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 01:10:56.758241 env[1553]: time="2025-05-17T01:10:56.758228786Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 01:10:56.758241 env[1553]: time="2025-05-17T01:10:56.758238054Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 01:10:56.758271 env[1553]: time="2025-05-17T01:10:56.758245205Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 01:10:56.758271 env[1553]: time="2025-05-17T01:10:56.758251780Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 01:10:56.758271 env[1553]: time="2025-05-17T01:10:56.758258547Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 01:10:56.758271 env[1553]: time="2025-05-17T01:10:56.758265450Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 01:10:56.758340 env[1553]: time="2025-05-17T01:10:56.758272148Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 01:10:56.758340 env[1553]: time="2025-05-17T01:10:56.758278233Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 01:10:56.758340 env[1553]: time="2025-05-17T01:10:56.758285893Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 01:10:56.758409 env[1553]: time="2025-05-17T01:10:56.758351500Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 01:10:56.758409 env[1553]: time="2025-05-17T01:10:56.758360502Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 01:10:56.758409 env[1553]: time="2025-05-17T01:10:56.758367221Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 01:10:56.758409 env[1553]: time="2025-05-17T01:10:56.758373517Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 01:10:56.758409 env[1553]: time="2025-05-17T01:10:56.758381090Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 01:10:56.758409 env[1553]: time="2025-05-17T01:10:56.758387057Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 01:10:56.758409 env[1553]: time="2025-05-17T01:10:56.758399554Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 01:10:56.758518 env[1553]: time="2025-05-17T01:10:56.758421842Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 01:10:56.758643 env[1553]: time="2025-05-17T01:10:56.758585013Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 01:10:56.760514 env[1553]: time="2025-05-17T01:10:56.758704595Z" level=info msg="Connect containerd service" May 17 01:10:56.760514 env[1553]: time="2025-05-17T01:10:56.758764492Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 01:10:56.760514 env[1553]: time="2025-05-17T01:10:56.759158194Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 01:10:56.760514 env[1553]: time="2025-05-17T01:10:56.759262205Z" level=info msg="Start subscribing containerd event" May 17 01:10:56.760514 env[1553]: time="2025-05-17T01:10:56.759287785Z" level=info msg="Start recovering state" May 17 01:10:56.760514 env[1553]: time="2025-05-17T01:10:56.759290648Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 01:10:56.760514 env[1553]: time="2025-05-17T01:10:56.759322452Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 01:10:56.760514 env[1553]: time="2025-05-17T01:10:56.759323683Z" level=info msg="Start event monitor" May 17 01:10:56.760514 env[1553]: time="2025-05-17T01:10:56.759336598Z" level=info msg="Start snapshots syncer" May 17 01:10:56.760514 env[1553]: time="2025-05-17T01:10:56.759342031Z" level=info msg="Start cni network conf syncer for default" May 17 01:10:56.760514 env[1553]: time="2025-05-17T01:10:56.759346095Z" level=info msg="Start streaming server" May 17 01:10:56.760514 env[1553]: time="2025-05-17T01:10:56.759346518Z" level=info msg="containerd successfully booted in 0.023476s" May 17 01:10:56.767462 systemd[1]: Started containerd.service. May 17 01:10:56.775956 systemd[1]: Started locksmithd.service. May 17 01:10:56.782474 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 01:10:56.782612 systemd[1]: Reached target system-config.target. May 17 01:10:56.790430 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 01:10:56.790505 systemd[1]: Reached target user-config.target. May 17 01:10:56.833900 locksmithd[1591]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 01:10:57.007389 systemd-networkd[1311]: bond0: Gained IPv6LL May 17 01:10:57.008930 sshd_keygen[1546]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 01:10:57.021882 systemd[1]: Finished sshd-keygen.service. May 17 01:10:57.029532 systemd[1]: Starting issuegen.service... May 17 01:10:57.036638 systemd[1]: issuegen.service: Deactivated successfully. May 17 01:10:57.036711 systemd[1]: Finished issuegen.service. May 17 01:10:57.044245 systemd[1]: Starting systemd-user-sessions.service... May 17 01:10:57.052582 systemd[1]: Finished systemd-user-sessions.service. May 17 01:10:57.062041 systemd[1]: Started getty@tty1.service. May 17 01:10:57.068992 systemd[1]: Started serial-getty@ttyS1.service. May 17 01:10:57.077517 systemd[1]: Reached target getty.target. May 17 01:10:57.106343 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 May 17 01:10:57.135233 extend-filesystems[1537]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required May 17 01:10:57.135233 extend-filesystems[1537]: old_desc_blocks = 1, new_desc_blocks = 56 May 17 01:10:57.135233 extend-filesystems[1537]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. May 17 01:10:57.172385 extend-filesystems[1521]: Resized filesystem in /dev/sdb9 May 17 01:10:57.135586 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 01:10:57.135673 systemd[1]: Finished extend-filesystems.service. May 17 01:10:57.264402 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 01:10:57.274633 systemd[1]: Reached target network-online.target. May 17 01:10:57.283291 systemd[1]: Starting kubelet.service... May 17 01:10:57.650368 kernel: mlx5_core 0000:02:00.0: lag map port 1:1 port 2:2 shared_fdb:0 May 17 01:10:58.060861 systemd[1]: Started kubelet.service. May 17 01:10:58.505966 kubelet[1622]: E0517 01:10:58.505887 1622 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 01:10:58.507039 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 01:10:58.507110 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 01:11:02.090624 login[1611]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 01:11:02.098960 login[1610]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 01:11:02.099264 systemd-logind[1547]: New session 1 of user core. May 17 01:11:02.100227 systemd[1]: Created slice user-500.slice. May 17 01:11:02.100966 systemd[1]: Starting user-runtime-dir@500.service... May 17 01:11:02.102249 systemd-logind[1547]: New session 2 of user core. May 17 01:11:02.106804 systemd[1]: Finished user-runtime-dir@500.service. May 17 01:11:02.107630 systemd[1]: Starting user@500.service... May 17 01:11:02.109525 (systemd)[1639]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 01:11:02.177660 systemd[1639]: Queued start job for default target default.target. May 17 01:11:02.177896 systemd[1639]: Reached target paths.target. May 17 01:11:02.177907 systemd[1639]: Reached target sockets.target. May 17 01:11:02.177915 systemd[1639]: Reached target timers.target. May 17 01:11:02.177922 systemd[1639]: Reached target basic.target. May 17 01:11:02.177942 systemd[1639]: Reached target default.target. May 17 01:11:02.177956 systemd[1639]: Startup finished in 65ms. May 17 01:11:02.177984 systemd[1]: Started user@500.service. May 17 01:11:02.178744 systemd[1]: Started session-1.scope. May 17 01:11:02.179209 systemd[1]: Started session-2.scope. May 17 01:11:02.320434 coreos-metadata[1516]: May 17 01:11:02.320 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known May 17 01:11:02.321204 coreos-metadata[1513]: May 17 01:11:02.320 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known May 17 01:11:03.046320 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:2 port 2:2 May 17 01:11:03.054451 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 May 17 01:11:03.320883 coreos-metadata[1513]: May 17 01:11:03.320 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 May 17 01:11:03.321139 coreos-metadata[1516]: May 17 01:11:03.320 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 May 17 01:11:03.677374 systemd-timesyncd[1494]: Contacted time server 104.131.155.175:123 (0.flatcar.pool.ntp.org). May 17 01:11:03.677509 systemd-timesyncd[1494]: Initial clock synchronization to Sat 2025-05-17 01:11:03.471035 UTC. May 17 01:11:03.880926 systemd[1]: Created slice system-sshd.slice. May 17 01:11:03.881594 systemd[1]: Started sshd@0-147.28.180.77:22-139.178.89.65:51910.service. May 17 01:11:03.956608 sshd[1660]: Accepted publickey for core from 139.178.89.65 port 51910 ssh2: RSA SHA256:dr8898nfQ8VsNqyYr3tPQc6zAjTUznXmSFSYfivFPZc May 17 01:11:03.957280 sshd[1660]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:11:03.959690 systemd-logind[1547]: New session 3 of user core. May 17 01:11:03.960461 systemd[1]: Started session-3.scope. May 17 01:11:04.011770 systemd[1]: Started sshd@1-147.28.180.77:22-139.178.89.65:51912.service. May 17 01:11:04.043264 sshd[1665]: Accepted publickey for core from 139.178.89.65 port 51912 ssh2: RSA SHA256:dr8898nfQ8VsNqyYr3tPQc6zAjTUznXmSFSYfivFPZc May 17 01:11:04.043995 sshd[1665]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:11:04.046092 systemd-logind[1547]: New session 4 of user core. May 17 01:11:04.046834 systemd[1]: Started session-4.scope. May 17 01:11:04.095315 sshd[1665]: pam_unix(sshd:session): session closed for user core May 17 01:11:04.097364 systemd[1]: sshd@1-147.28.180.77:22-139.178.89.65:51912.service: Deactivated successfully. May 17 01:11:04.097770 systemd[1]: session-4.scope: Deactivated successfully. May 17 01:11:04.098133 systemd-logind[1547]: Session 4 logged out. Waiting for processes to exit. May 17 01:11:04.098758 systemd[1]: Started sshd@2-147.28.180.77:22-139.178.89.65:51918.service. May 17 01:11:04.099283 systemd-logind[1547]: Removed session 4. May 17 01:11:04.128319 sshd[1671]: Accepted publickey for core from 139.178.89.65 port 51918 ssh2: RSA SHA256:dr8898nfQ8VsNqyYr3tPQc6zAjTUznXmSFSYfivFPZc May 17 01:11:04.129192 sshd[1671]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:11:04.132344 systemd-logind[1547]: New session 5 of user core. May 17 01:11:04.133449 systemd[1]: Started session-5.scope. May 17 01:11:04.189379 sshd[1671]: pam_unix(sshd:session): session closed for user core May 17 01:11:04.190599 systemd[1]: sshd@2-147.28.180.77:22-139.178.89.65:51918.service: Deactivated successfully. May 17 01:11:04.190998 systemd[1]: session-5.scope: Deactivated successfully. May 17 01:11:04.191326 systemd-logind[1547]: Session 5 logged out. Waiting for processes to exit. May 17 01:11:04.191745 systemd-logind[1547]: Removed session 5. May 17 01:11:04.360172 coreos-metadata[1516]: May 17 01:11:04.359 INFO Fetch successful May 17 01:11:04.370362 coreos-metadata[1513]: May 17 01:11:04.370 INFO Fetch successful May 17 01:11:04.403198 systemd[1]: Finished coreos-metadata.service. May 17 01:11:04.404071 systemd[1]: Started packet-phone-home.service. May 17 01:11:04.416801 curl[1679]: % Total % Received % Xferd Average Speed Time Time Time Current May 17 01:11:04.425728 curl[1679]: Dload Upload Total Spent Left Speed May 17 01:11:04.426002 unknown[1513]: wrote ssh authorized keys file for user: core May 17 01:11:04.438096 update-ssh-keys[1680]: Updated "/home/core/.ssh/authorized_keys" May 17 01:11:04.438358 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 17 01:11:04.438641 systemd[1]: Reached target multi-user.target. May 17 01:11:04.439391 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 01:11:04.443690 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 01:11:04.443774 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 01:11:04.443928 systemd[1]: Startup finished in 1.949s (kernel) + 23.597s (initrd) + 15.006s (userspace) = 40.553s. May 17 01:11:04.770490 curl[1679]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 May 17 01:11:04.772839 systemd[1]: packet-phone-home.service: Deactivated successfully. May 17 01:11:08.676354 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 17 01:11:08.677133 systemd[1]: Stopped kubelet.service. May 17 01:11:08.679851 systemd[1]: Starting kubelet.service... May 17 01:11:08.918425 systemd[1]: Started kubelet.service. May 17 01:11:08.993484 kubelet[1686]: E0517 01:11:08.993367 1686 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 01:11:08.996453 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 01:11:08.996557 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 01:11:14.049106 systemd[1]: Started sshd@3-147.28.180.77:22-139.178.89.65:56100.service. May 17 01:11:14.082241 sshd[1705]: Accepted publickey for core from 139.178.89.65 port 56100 ssh2: RSA SHA256:dr8898nfQ8VsNqyYr3tPQc6zAjTUznXmSFSYfivFPZc May 17 01:11:14.082912 sshd[1705]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:11:14.085150 systemd-logind[1547]: New session 6 of user core. May 17 01:11:14.085898 systemd[1]: Started session-6.scope. May 17 01:11:14.137558 sshd[1705]: pam_unix(sshd:session): session closed for user core May 17 01:11:14.139496 systemd[1]: sshd@3-147.28.180.77:22-139.178.89.65:56100.service: Deactivated successfully. May 17 01:11:14.139881 systemd[1]: session-6.scope: Deactivated successfully. May 17 01:11:14.140222 systemd-logind[1547]: Session 6 logged out. Waiting for processes to exit. May 17 01:11:14.140814 systemd[1]: Started sshd@4-147.28.180.77:22-139.178.89.65:56106.service. May 17 01:11:14.141292 systemd-logind[1547]: Removed session 6. May 17 01:11:14.174544 sshd[1711]: Accepted publickey for core from 139.178.89.65 port 56106 ssh2: RSA SHA256:dr8898nfQ8VsNqyYr3tPQc6zAjTUznXmSFSYfivFPZc May 17 01:11:14.175233 sshd[1711]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:11:14.177464 systemd-logind[1547]: New session 7 of user core. May 17 01:11:14.178125 systemd[1]: Started session-7.scope. May 17 01:11:14.224535 sshd[1711]: pam_unix(sshd:session): session closed for user core May 17 01:11:14.227660 systemd[1]: sshd@4-147.28.180.77:22-139.178.89.65:56106.service: Deactivated successfully. May 17 01:11:14.228360 systemd[1]: session-7.scope: Deactivated successfully. May 17 01:11:14.229023 systemd-logind[1547]: Session 7 logged out. Waiting for processes to exit. May 17 01:11:14.230121 systemd[1]: Started sshd@5-147.28.180.77:22-139.178.89.65:56114.service. May 17 01:11:14.231175 systemd-logind[1547]: Removed session 7. May 17 01:11:14.271615 sshd[1717]: Accepted publickey for core from 139.178.89.65 port 56114 ssh2: RSA SHA256:dr8898nfQ8VsNqyYr3tPQc6zAjTUznXmSFSYfivFPZc May 17 01:11:14.272400 sshd[1717]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:11:14.274982 systemd-logind[1547]: New session 8 of user core. May 17 01:11:14.275801 systemd[1]: Started session-8.scope. May 17 01:11:14.335858 sshd[1717]: pam_unix(sshd:session): session closed for user core May 17 01:11:14.344542 systemd[1]: sshd@5-147.28.180.77:22-139.178.89.65:56114.service: Deactivated successfully. May 17 01:11:14.346671 systemd[1]: session-8.scope: Deactivated successfully. May 17 01:11:14.348754 systemd-logind[1547]: Session 8 logged out. Waiting for processes to exit. May 17 01:11:14.351824 systemd[1]: Started sshd@6-147.28.180.77:22-139.178.89.65:56120.service. May 17 01:11:14.354691 systemd-logind[1547]: Removed session 8. May 17 01:11:14.432619 sshd[1723]: Accepted publickey for core from 139.178.89.65 port 56120 ssh2: RSA SHA256:dr8898nfQ8VsNqyYr3tPQc6zAjTUznXmSFSYfivFPZc May 17 01:11:14.433476 sshd[1723]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:11:14.436369 systemd-logind[1547]: New session 9 of user core. May 17 01:11:14.437213 systemd[1]: Started session-9.scope. May 17 01:11:14.514291 sudo[1726]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 01:11:14.515000 sudo[1726]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 01:11:14.535905 dbus-daemon[1519]: \xd0m\xb6W6V: received setenforce notice (enforcing=1183418480) May 17 01:11:14.540199 sudo[1726]: pam_unix(sudo:session): session closed for user root May 17 01:11:14.542159 sshd[1723]: pam_unix(sshd:session): session closed for user core May 17 01:11:14.544134 systemd[1]: sshd@6-147.28.180.77:22-139.178.89.65:56120.service: Deactivated successfully. May 17 01:11:14.544563 systemd[1]: session-9.scope: Deactivated successfully. May 17 01:11:14.544921 systemd-logind[1547]: Session 9 logged out. Waiting for processes to exit. May 17 01:11:14.545538 systemd[1]: Started sshd@7-147.28.180.77:22-139.178.89.65:56136.service. May 17 01:11:14.546057 systemd-logind[1547]: Removed session 9. May 17 01:11:14.584629 sshd[1730]: Accepted publickey for core from 139.178.89.65 port 56136 ssh2: RSA SHA256:dr8898nfQ8VsNqyYr3tPQc6zAjTUznXmSFSYfivFPZc May 17 01:11:14.585490 sshd[1730]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:11:14.588013 systemd-logind[1547]: New session 10 of user core. May 17 01:11:14.588890 systemd[1]: Started session-10.scope. May 17 01:11:14.651633 sudo[1734]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 01:11:14.652317 sudo[1734]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 01:11:14.659721 sudo[1734]: pam_unix(sudo:session): session closed for user root May 17 01:11:14.672894 sudo[1733]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 01:11:14.673632 sudo[1733]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 01:11:14.699155 systemd[1]: Stopping audit-rules.service... May 17 01:11:14.700000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 01:11:14.702455 auditctl[1737]: No rules May 17 01:11:14.703252 systemd[1]: audit-rules.service: Deactivated successfully. May 17 01:11:14.703695 systemd[1]: Stopped audit-rules.service. May 17 01:11:14.707867 kernel: kauditd_printk_skb: 143 callbacks suppressed May 17 01:11:14.707899 kernel: audit: type=1305 audit(1747444274.700:196): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 01:11:14.707842 systemd[1]: Starting audit-rules.service... May 17 01:11:14.717187 augenrules[1754]: No rules May 17 01:11:14.717544 systemd[1]: Finished audit-rules.service. May 17 01:11:14.718013 sudo[1733]: pam_unix(sudo:session): session closed for user root May 17 01:11:14.718791 sshd[1730]: pam_unix(sshd:session): session closed for user core May 17 01:11:14.720655 systemd[1]: sshd@7-147.28.180.77:22-139.178.89.65:56136.service: Deactivated successfully. May 17 01:11:14.721009 systemd[1]: session-10.scope: Deactivated successfully. May 17 01:11:14.721383 systemd-logind[1547]: Session 10 logged out. Waiting for processes to exit. May 17 01:11:14.721943 systemd[1]: Started sshd@8-147.28.180.77:22-139.178.89.65:56146.service. May 17 01:11:14.722454 systemd-logind[1547]: Removed session 10. May 17 01:11:14.700000 audit[1737]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc1fcb8840 a2=420 a3=0 items=0 ppid=1 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:14.754151 kernel: audit: type=1300 audit(1747444274.700:196): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc1fcb8840 a2=420 a3=0 items=0 ppid=1 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:14.754213 kernel: audit: type=1327 audit(1747444274.700:196): proctitle=2F7362696E2F617564697463746C002D44 May 17 01:11:14.700000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 01:11:14.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:11:14.785949 kernel: audit: type=1131 audit(1747444274.702:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:11:14.785978 kernel: audit: type=1130 audit(1747444274.716:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:11:14.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:11:14.791192 sshd[1760]: Accepted publickey for core from 139.178.89.65 port 56146 ssh2: RSA SHA256:dr8898nfQ8VsNqyYr3tPQc6zAjTUznXmSFSYfivFPZc May 17 01:11:14.792758 sshd[1760]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 01:11:14.795054 systemd-logind[1547]: New session 11 of user core. May 17 01:11:14.795775 systemd[1]: Started session-11.scope. May 17 01:11:14.808277 kernel: audit: type=1106 audit(1747444274.716:199): pid=1733 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 01:11:14.716000 audit[1733]: USER_END pid=1733 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 01:11:14.834164 kernel: audit: type=1104 audit(1747444274.716:200): pid=1733 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 01:11:14.716000 audit[1733]: CRED_DISP pid=1733 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 01:11:14.842082 sudo[1763]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 01:11:14.842203 sudo[1763]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 01:11:14.718000 audit[1730]: USER_END pid=1730 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 01:11:14.889559 kernel: audit: type=1106 audit(1747444274.718:201): pid=1730 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 01:11:14.889599 kernel: audit: type=1104 audit(1747444274.718:202): pid=1730 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 01:11:14.718000 audit[1730]: CRED_DISP pid=1730 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 01:11:14.915276 kernel: audit: type=1131 audit(1747444274.719:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.28.180.77:22-139.178.89.65:56136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:11:14.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.28.180.77:22-139.178.89.65:56136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:11:14.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.28.180.77:22-139.178.89.65:56146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:11:14.790000 audit[1760]: USER_ACCT pid=1760 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 01:11:14.792000 audit[1760]: CRED_ACQ pid=1760 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 01:11:14.792000 audit[1760]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb6c11ee0 a2=3 a3=0 items=0 ppid=1 pid=1760 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:14.792000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 01:11:14.796000 audit[1760]: USER_START pid=1760 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 01:11:14.797000 audit[1762]: CRED_ACQ pid=1762 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 01:11:14.840000 audit[1763]: USER_ACCT pid=1763 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 01:11:14.840000 audit[1763]: CRED_REFR pid=1763 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 01:11:14.841000 audit[1763]: USER_START pid=1763 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 01:11:15.520902 systemd[1]: Stopped kubelet.service. May 17 01:11:15.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:11:15.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:11:15.522022 systemd[1]: Starting kubelet.service... May 17 01:11:15.536787 systemd[1]: Reloading. May 17 01:11:15.566921 /usr/lib/systemd/system-generators/torcx-generator[1840]: time="2025-05-17T01:11:15Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 01:11:15.566940 /usr/lib/systemd/system-generators/torcx-generator[1840]: time="2025-05-17T01:11:15Z" level=info msg="torcx already run" May 17 01:11:15.621494 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 01:11:15.621502 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 01:11:15.634111 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 01:11:15.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.682000 audit: BPF prog-id=46 op=LOAD May 17 01:11:15.682000 audit: BPF prog-id=44 op=UNLOAD May 17 01:11:15.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.682000 audit: BPF prog-id=47 op=LOAD May 17 01:11:15.682000 audit: BPF prog-id=40 op=UNLOAD May 17 01:11:15.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit: BPF prog-id=48 op=LOAD May 17 01:11:15.683000 audit: BPF prog-id=30 op=UNLOAD May 17 01:11:15.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit: BPF prog-id=49 op=LOAD May 17 01:11:15.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit: BPF prog-id=50 op=LOAD May 17 01:11:15.683000 audit: BPF prog-id=31 op=UNLOAD May 17 01:11:15.683000 audit: BPF prog-id=32 op=UNLOAD May 17 01:11:15.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.683000 audit: BPF prog-id=51 op=LOAD May 17 01:11:15.683000 audit: BPF prog-id=33 op=UNLOAD May 17 01:11:15.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit: BPF prog-id=52 op=LOAD May 17 01:11:15.685000 audit: BPF prog-id=41 op=UNLOAD May 17 01:11:15.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit: BPF prog-id=53 op=LOAD May 17 01:11:15.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.685000 audit: BPF prog-id=54 op=LOAD May 17 01:11:15.685000 audit: BPF prog-id=42 op=UNLOAD May 17 01:11:15.685000 audit: BPF prog-id=43 op=UNLOAD May 17 01:11:15.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit: BPF prog-id=55 op=LOAD May 17 01:11:15.686000 audit: BPF prog-id=34 op=UNLOAD May 17 01:11:15.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit: BPF prog-id=56 op=LOAD May 17 01:11:15.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.686000 audit: BPF prog-id=57 op=LOAD May 17 01:11:15.686000 audit: BPF prog-id=35 op=UNLOAD May 17 01:11:15.686000 audit: BPF prog-id=36 op=UNLOAD May 17 01:11:15.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.687000 audit: BPF prog-id=58 op=LOAD May 17 01:11:15.687000 audit: BPF prog-id=39 op=UNLOAD May 17 01:11:15.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.688000 audit: BPF prog-id=59 op=LOAD May 17 01:11:15.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:15.688000 audit: BPF prog-id=60 op=LOAD May 17 01:11:15.688000 audit: BPF prog-id=37 op=UNLOAD May 17 01:11:15.688000 audit: BPF prog-id=38 op=UNLOAD May 17 01:11:15.715765 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 17 01:11:15.715802 systemd[1]: kubelet.service: Failed with result 'signal'. May 17 01:11:15.715901 systemd[1]: Stopped kubelet.service. May 17 01:11:15.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 01:11:15.716728 systemd[1]: Starting kubelet.service... May 17 01:11:15.968057 systemd[1]: Started kubelet.service. May 17 01:11:15.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:11:15.990645 kubelet[1906]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 01:11:15.990645 kubelet[1906]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 01:11:15.990645 kubelet[1906]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 01:11:15.990645 kubelet[1906]: I0517 01:11:15.990634 1906 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 01:11:16.353797 kubelet[1906]: I0517 01:11:16.353731 1906 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" May 17 01:11:16.353797 kubelet[1906]: I0517 01:11:16.353743 1906 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 01:11:16.353855 kubelet[1906]: I0517 01:11:16.353837 1906 server.go:956] "Client rotation is on, will bootstrap in background" May 17 01:11:16.372455 kubelet[1906]: I0517 01:11:16.372433 1906 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 01:11:16.385143 kubelet[1906]: E0517 01:11:16.385098 1906 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 01:11:16.385143 kubelet[1906]: I0517 01:11:16.385116 1906 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 01:11:16.404978 kubelet[1906]: I0517 01:11:16.404959 1906 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 01:11:16.405136 kubelet[1906]: I0517 01:11:16.405087 1906 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 01:11:16.405215 kubelet[1906]: I0517 01:11:16.405108 1906 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.67.80.37","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 01:11:16.405303 kubelet[1906]: I0517 01:11:16.405220 1906 topology_manager.go:138] "Creating topology manager with none policy" May 17 01:11:16.405303 kubelet[1906]: I0517 01:11:16.405227 1906 container_manager_linux.go:303] "Creating device plugin manager" May 17 01:11:16.405303 kubelet[1906]: I0517 01:11:16.405299 1906 state_mem.go:36] "Initialized new in-memory state store" May 17 01:11:16.407487 kubelet[1906]: I0517 01:11:16.407463 1906 kubelet.go:480] "Attempting to sync node with API server" May 17 01:11:16.407487 kubelet[1906]: I0517 01:11:16.407476 1906 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 01:11:16.407576 kubelet[1906]: I0517 01:11:16.407491 1906 kubelet.go:386] "Adding apiserver pod source" May 17 01:11:16.409407 kubelet[1906]: E0517 01:11:16.409357 1906 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:16.409407 kubelet[1906]: E0517 01:11:16.409368 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:16.411784 kubelet[1906]: I0517 01:11:16.411766 1906 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 01:11:16.424672 kubelet[1906]: I0517 01:11:16.424635 1906 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 01:11:16.425035 kubelet[1906]: I0517 01:11:16.424997 1906 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" May 17 01:11:16.425751 kubelet[1906]: W0517 01:11:16.425711 1906 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 01:11:16.427175 kubelet[1906]: I0517 01:11:16.427127 1906 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 01:11:16.427175 kubelet[1906]: I0517 01:11:16.427158 1906 server.go:1289] "Started kubelet" May 17 01:11:16.428026 kubelet[1906]: I0517 01:11:16.427953 1906 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 01:11:16.428092 kubelet[1906]: I0517 01:11:16.427941 1906 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 May 17 01:11:16.428287 kubelet[1906]: I0517 01:11:16.428271 1906 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 01:11:16.427000 audit[1906]: AVC avc: denied { mac_admin } for pid=1906 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:16.427000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 01:11:16.427000 audit[1906]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000830d50 a1=c000ac3260 a2=c000830d20 a3=25 items=0 ppid=1 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:16.427000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 01:11:16.427000 audit[1906]: AVC avc: denied { mac_admin } for pid=1906 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:16.427000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 01:11:16.427000 audit[1906]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bca3c0 a1=c000ac3278 a2=c000830de0 a3=25 items=0 ppid=1 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:16.427000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 01:11:16.429762 kubelet[1906]: I0517 01:11:16.429263 1906 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 01:11:16.429762 kubelet[1906]: I0517 01:11:16.429305 1906 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 01:11:16.429762 kubelet[1906]: I0517 01:11:16.429373 1906 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 01:11:16.429762 kubelet[1906]: E0517 01:11:16.429437 1906 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.67.80.37\" not found" May 17 01:11:16.429762 kubelet[1906]: I0517 01:11:16.429584 1906 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 01:11:16.429762 kubelet[1906]: I0517 01:11:16.429672 1906 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 01:11:16.430012 kubelet[1906]: I0517 01:11:16.429915 1906 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 01:11:16.430012 kubelet[1906]: I0517 01:11:16.429952 1906 reconciler.go:26] "Reconciler: start to sync state" May 17 01:11:16.430479 kubelet[1906]: E0517 01:11:16.430455 1906 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 01:11:16.430560 kubelet[1906]: I0517 01:11:16.430544 1906 factory.go:223] Registration of the systemd container factory successfully May 17 01:11:16.430649 kubelet[1906]: I0517 01:11:16.430635 1906 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 01:11:16.431018 kubelet[1906]: I0517 01:11:16.431004 1906 server.go:317] "Adding debug handlers to kubelet server" May 17 01:11:16.431707 kubelet[1906]: I0517 01:11:16.431695 1906 factory.go:223] Registration of the containerd container factory successfully May 17 01:11:16.443056 kubelet[1906]: E0517 01:11:16.443006 1906 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.67.80.37\" not found" node="10.67.80.37" May 17 01:11:16.444228 kubelet[1906]: I0517 01:11:16.444191 1906 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 01:11:16.444228 kubelet[1906]: I0517 01:11:16.444201 1906 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 01:11:16.444228 kubelet[1906]: I0517 01:11:16.444215 1906 state_mem.go:36] "Initialized new in-memory state store" May 17 01:11:16.460650 kubelet[1906]: I0517 01:11:16.460613 1906 policy_none.go:49] "None policy: Start" May 17 01:11:16.460650 kubelet[1906]: I0517 01:11:16.460628 1906 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 01:11:16.460650 kubelet[1906]: I0517 01:11:16.460637 1906 state_mem.go:35] "Initializing new in-memory state store" May 17 01:11:16.463921 systemd[1]: Created slice kubepods.slice. May 17 01:11:16.467233 systemd[1]: Created slice kubepods-burstable.slice. May 17 01:11:16.469560 systemd[1]: Created slice kubepods-besteffort.slice. May 17 01:11:16.470000 audit[1940]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1940 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:16.470000 audit[1940]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd33d16570 a2=0 a3=7ffd33d1655c items=0 ppid=1906 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:16.470000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 01:11:16.471000 audit[1941]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1941 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:16.471000 audit[1941]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe1adfaae0 a2=0 a3=7ffe1adfaacc items=0 ppid=1906 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:16.471000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 01:11:16.487029 kubelet[1906]: E0517 01:11:16.487010 1906 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" May 17 01:11:16.486000 audit[1906]: AVC avc: denied { mac_admin } for pid=1906 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:16.486000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 01:11:16.486000 audit[1906]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00112c8a0 a1=c0010909d8 a2=c00112c870 a3=25 items=0 ppid=1 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:16.486000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 01:11:16.487353 kubelet[1906]: E0517 01:11:16.487059 1906 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" May 17 01:11:16.487353 kubelet[1906]: I0517 01:11:16.487147 1906 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 01:11:16.487353 kubelet[1906]: I0517 01:11:16.487157 1906 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 01:11:16.487353 kubelet[1906]: I0517 01:11:16.487283 1906 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 01:11:16.487775 kubelet[1906]: E0517 01:11:16.487731 1906 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 01:11:16.487775 kubelet[1906]: E0517 01:11:16.487763 1906 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.80.37\" not found" May 17 01:11:16.472000 audit[1943]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1943 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:16.472000 audit[1943]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe60ae6d70 a2=0 a3=7ffe60ae6d5c items=0 ppid=1906 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:16.472000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 01:11:16.511000 audit[1948]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1948 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:16.511000 audit[1948]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe8db5fac0 a2=0 a3=7ffe8db5faac items=0 ppid=1906 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:16.511000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 01:11:16.569000 audit[1953]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1953 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:16.569000 audit[1953]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffdf300cc80 a2=0 a3=7ffdf300cc6c items=0 ppid=1906 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:16.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 01:11:16.571407 kubelet[1906]: I0517 01:11:16.571339 1906 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" May 17 01:11:16.570000 audit[1954]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1954 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:16.570000 audit[1954]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffef1297cb0 a2=0 a3=7ffef1297c9c items=0 ppid=1906 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:16.570000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 01:11:16.570000 audit[1955]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1955 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:16.570000 audit[1955]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd521525b0 a2=0 a3=7ffd5215259c items=0 ppid=1906 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:16.570000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 01:11:16.572179 kubelet[1906]: I0517 01:11:16.572035 1906 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" May 17 01:11:16.572179 kubelet[1906]: I0517 01:11:16.572046 1906 status_manager.go:230] "Starting to sync pod status with apiserver" May 17 01:11:16.572179 kubelet[1906]: I0517 01:11:16.572059 1906 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 01:11:16.572179 kubelet[1906]: I0517 01:11:16.572064 1906 kubelet.go:2436] "Starting kubelet main sync loop" May 17 01:11:16.572179 kubelet[1906]: E0517 01:11:16.572152 1906 kubelet.go:2460] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 17 01:11:16.571000 audit[1956]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1956 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:16.571000 audit[1956]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd6ff001e0 a2=0 a3=7ffd6ff001cc items=0 ppid=1906 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:16.571000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 01:11:16.571000 audit[1957]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1957 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:16.571000 audit[1957]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdaab18f90 a2=0 a3=7ffdaab18f7c items=0 ppid=1906 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:16.571000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 01:11:16.572000 audit[1958]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1958 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:16.572000 audit[1958]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8f3395b0 a2=0 a3=7ffe8f33959c items=0 ppid=1906 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:16.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 01:11:16.572000 audit[1959]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1959 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:16.572000 audit[1959]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd0ec7b210 a2=0 a3=7ffd0ec7b1fc items=0 ppid=1906 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:16.572000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 01:11:16.572000 audit[1960]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1960 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:16.572000 audit[1960]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe75aad040 a2=0 a3=7ffe75aad02c items=0 ppid=1906 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:16.572000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 01:11:16.588530 kubelet[1906]: I0517 01:11:16.588518 1906 kubelet_node_status.go:75] "Attempting to register node" node="10.67.80.37" May 17 01:11:16.595361 kubelet[1906]: I0517 01:11:16.595351 1906 kubelet_node_status.go:78] "Successfully registered node" node="10.67.80.37" May 17 01:11:16.706443 kubelet[1906]: I0517 01:11:16.706422 1906 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 17 01:11:16.706688 env[1553]: time="2025-05-17T01:11:16.706664396Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 01:11:16.706922 kubelet[1906]: I0517 01:11:16.706788 1906 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 17 01:11:17.010000 audit[1763]: USER_END pid=1763 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 01:11:17.011457 sudo[1763]: pam_unix(sudo:session): session closed for user root May 17 01:11:17.010000 audit[1763]: CRED_DISP pid=1763 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 01:11:17.014559 sshd[1760]: pam_unix(sshd:session): session closed for user core May 17 01:11:17.015000 audit[1760]: USER_END pid=1760 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 01:11:17.016000 audit[1760]: CRED_DISP pid=1760 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 01:11:17.020618 systemd[1]: sshd@8-147.28.180.77:22-139.178.89.65:56146.service: Deactivated successfully. May 17 01:11:17.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.28.180.77:22-139.178.89.65:56146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 01:11:17.022397 systemd[1]: session-11.scope: Deactivated successfully. May 17 01:11:17.024160 systemd-logind[1547]: Session 11 logged out. Waiting for processes to exit. May 17 01:11:17.026528 systemd-logind[1547]: Removed session 11. May 17 01:11:17.355680 kubelet[1906]: I0517 01:11:17.355474 1906 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 17 01:11:17.356750 kubelet[1906]: I0517 01:11:17.355964 1906 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" May 17 01:11:17.356750 kubelet[1906]: I0517 01:11:17.355964 1906 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" May 17 01:11:17.356750 kubelet[1906]: I0517 01:11:17.355985 1906 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" May 17 01:11:17.410597 kubelet[1906]: E0517 01:11:17.410477 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:17.412866 kubelet[1906]: I0517 01:11:17.412774 1906 apiserver.go:52] "Watching apiserver" May 17 01:11:17.436907 kubelet[1906]: I0517 01:11:17.436844 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/5628b461-13a4-4f69-b35b-e90e955ae865-varrun\") pod \"csi-node-driver-gpw96\" (UID: \"5628b461-13a4-4f69-b35b-e90e955ae865\") " pod="calico-system/csi-node-driver-gpw96" May 17 01:11:17.436907 kubelet[1906]: I0517 01:11:17.436876 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vvckh\" (UniqueName: \"kubernetes.io/projected/5628b461-13a4-4f69-b35b-e90e955ae865-kube-api-access-vvckh\") pod \"csi-node-driver-gpw96\" (UID: \"5628b461-13a4-4f69-b35b-e90e955ae865\") " pod="calico-system/csi-node-driver-gpw96" May 17 01:11:17.436907 kubelet[1906]: I0517 01:11:17.436892 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/5628b461-13a4-4f69-b35b-e90e955ae865-kubelet-dir\") pod \"csi-node-driver-gpw96\" (UID: \"5628b461-13a4-4f69-b35b-e90e955ae865\") " pod="calico-system/csi-node-driver-gpw96" May 17 01:11:17.436907 kubelet[1906]: I0517 01:11:17.436902 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/5628b461-13a4-4f69-b35b-e90e955ae865-registration-dir\") pod \"csi-node-driver-gpw96\" (UID: \"5628b461-13a4-4f69-b35b-e90e955ae865\") " pod="calico-system/csi-node-driver-gpw96" May 17 01:11:17.436907 kubelet[1906]: I0517 01:11:17.436913 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/5628b461-13a4-4f69-b35b-e90e955ae865-socket-dir\") pod \"csi-node-driver-gpw96\" (UID: \"5628b461-13a4-4f69-b35b-e90e955ae865\") " pod="calico-system/csi-node-driver-gpw96" May 17 01:11:17.443544 kubelet[1906]: E0517 01:11:17.443479 1906 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gpw96" podUID="5628b461-13a4-4f69-b35b-e90e955ae865" May 17 01:11:17.448483 systemd[1]: Created slice kubepods-besteffort-pod3ab2fe89_199b_48da_b89f_b5fd01b6a14e.slice. May 17 01:11:17.471871 systemd[1]: Created slice kubepods-besteffort-pod428e7b10_5b7f_4338_8289_f57d67cb9bbf.slice. May 17 01:11:17.530929 kubelet[1906]: I0517 01:11:17.530853 1906 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 01:11:17.537924 kubelet[1906]: I0517 01:11:17.537813 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/3ab2fe89-199b-48da-b89f-b5fd01b6a14e-node-certs\") pod \"calico-node-54r2s\" (UID: \"3ab2fe89-199b-48da-b89f-b5fd01b6a14e\") " pod="calico-system/calico-node-54r2s" May 17 01:11:17.537924 kubelet[1906]: I0517 01:11:17.537900 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/3ab2fe89-199b-48da-b89f-b5fd01b6a14e-policysync\") pod \"calico-node-54r2s\" (UID: \"3ab2fe89-199b-48da-b89f-b5fd01b6a14e\") " pod="calico-system/calico-node-54r2s" May 17 01:11:17.538214 kubelet[1906]: I0517 01:11:17.537954 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/3ab2fe89-199b-48da-b89f-b5fd01b6a14e-var-run-calico\") pod \"calico-node-54r2s\" (UID: \"3ab2fe89-199b-48da-b89f-b5fd01b6a14e\") " pod="calico-system/calico-node-54r2s" May 17 01:11:17.538214 kubelet[1906]: I0517 01:11:17.538058 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/428e7b10-5b7f-4338-8289-f57d67cb9bbf-kube-proxy\") pod \"kube-proxy-9lhgl\" (UID: \"428e7b10-5b7f-4338-8289-f57d67cb9bbf\") " pod="kube-system/kube-proxy-9lhgl" May 17 01:11:17.538214 kubelet[1906]: I0517 01:11:17.538174 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/3ab2fe89-199b-48da-b89f-b5fd01b6a14e-flexvol-driver-host\") pod \"calico-node-54r2s\" (UID: \"3ab2fe89-199b-48da-b89f-b5fd01b6a14e\") " pod="calico-system/calico-node-54r2s" May 17 01:11:17.538568 kubelet[1906]: I0517 01:11:17.538231 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3ab2fe89-199b-48da-b89f-b5fd01b6a14e-lib-modules\") pod \"calico-node-54r2s\" (UID: \"3ab2fe89-199b-48da-b89f-b5fd01b6a14e\") " pod="calico-system/calico-node-54r2s" May 17 01:11:17.538568 kubelet[1906]: I0517 01:11:17.538282 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3ab2fe89-199b-48da-b89f-b5fd01b6a14e-tigera-ca-bundle\") pod \"calico-node-54r2s\" (UID: \"3ab2fe89-199b-48da-b89f-b5fd01b6a14e\") " pod="calico-system/calico-node-54r2s" May 17 01:11:17.538568 kubelet[1906]: I0517 01:11:17.538363 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jtv45\" (UniqueName: \"kubernetes.io/projected/3ab2fe89-199b-48da-b89f-b5fd01b6a14e-kube-api-access-jtv45\") pod \"calico-node-54r2s\" (UID: \"3ab2fe89-199b-48da-b89f-b5fd01b6a14e\") " pod="calico-system/calico-node-54r2s" May 17 01:11:17.538568 kubelet[1906]: I0517 01:11:17.538557 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/428e7b10-5b7f-4338-8289-f57d67cb9bbf-xtables-lock\") pod \"kube-proxy-9lhgl\" (UID: \"428e7b10-5b7f-4338-8289-f57d67cb9bbf\") " pod="kube-system/kube-proxy-9lhgl" May 17 01:11:17.538938 kubelet[1906]: I0517 01:11:17.538611 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/428e7b10-5b7f-4338-8289-f57d67cb9bbf-lib-modules\") pod \"kube-proxy-9lhgl\" (UID: \"428e7b10-5b7f-4338-8289-f57d67cb9bbf\") " pod="kube-system/kube-proxy-9lhgl" May 17 01:11:17.538938 kubelet[1906]: I0517 01:11:17.538738 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3ab2fe89-199b-48da-b89f-b5fd01b6a14e-var-lib-calico\") pod \"calico-node-54r2s\" (UID: \"3ab2fe89-199b-48da-b89f-b5fd01b6a14e\") " pod="calico-system/calico-node-54r2s" May 17 01:11:17.538938 kubelet[1906]: I0517 01:11:17.538885 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2lr87\" (UniqueName: \"kubernetes.io/projected/428e7b10-5b7f-4338-8289-f57d67cb9bbf-kube-api-access-2lr87\") pod \"kube-proxy-9lhgl\" (UID: \"428e7b10-5b7f-4338-8289-f57d67cb9bbf\") " pod="kube-system/kube-proxy-9lhgl" May 17 01:11:17.539231 kubelet[1906]: I0517 01:11:17.538967 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/3ab2fe89-199b-48da-b89f-b5fd01b6a14e-cni-bin-dir\") pod \"calico-node-54r2s\" (UID: \"3ab2fe89-199b-48da-b89f-b5fd01b6a14e\") " pod="calico-system/calico-node-54r2s" May 17 01:11:17.539231 kubelet[1906]: I0517 01:11:17.539073 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/3ab2fe89-199b-48da-b89f-b5fd01b6a14e-cni-net-dir\") pod \"calico-node-54r2s\" (UID: \"3ab2fe89-199b-48da-b89f-b5fd01b6a14e\") " pod="calico-system/calico-node-54r2s" May 17 01:11:17.539231 kubelet[1906]: I0517 01:11:17.539150 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3ab2fe89-199b-48da-b89f-b5fd01b6a14e-xtables-lock\") pod \"calico-node-54r2s\" (UID: \"3ab2fe89-199b-48da-b89f-b5fd01b6a14e\") " pod="calico-system/calico-node-54r2s" May 17 01:11:17.539579 kubelet[1906]: I0517 01:11:17.539280 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/3ab2fe89-199b-48da-b89f-b5fd01b6a14e-cni-log-dir\") pod \"calico-node-54r2s\" (UID: \"3ab2fe89-199b-48da-b89f-b5fd01b6a14e\") " pod="calico-system/calico-node-54r2s" May 17 01:11:17.545865 kubelet[1906]: I0517 01:11:17.545775 1906 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 01:11:17.642473 kubelet[1906]: E0517 01:11:17.642274 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.642473 kubelet[1906]: W0517 01:11:17.642343 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.642473 kubelet[1906]: E0517 01:11:17.642390 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.643029 kubelet[1906]: E0517 01:11:17.642951 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.643029 kubelet[1906]: W0517 01:11:17.642979 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.643029 kubelet[1906]: E0517 01:11:17.643010 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.643683 kubelet[1906]: E0517 01:11:17.643609 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.643683 kubelet[1906]: W0517 01:11:17.643646 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.643683 kubelet[1906]: E0517 01:11:17.643679 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.644470 kubelet[1906]: E0517 01:11:17.644389 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.644470 kubelet[1906]: W0517 01:11:17.644415 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.644470 kubelet[1906]: E0517 01:11:17.644441 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.645065 kubelet[1906]: E0517 01:11:17.644985 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.645065 kubelet[1906]: W0517 01:11:17.645020 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.645065 kubelet[1906]: E0517 01:11:17.645053 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.645749 kubelet[1906]: E0517 01:11:17.645698 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.645934 kubelet[1906]: W0517 01:11:17.645748 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.645934 kubelet[1906]: E0517 01:11:17.645798 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.646536 kubelet[1906]: E0517 01:11:17.646455 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.646536 kubelet[1906]: W0517 01:11:17.646497 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.646873 kubelet[1906]: E0517 01:11:17.646542 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.647212 kubelet[1906]: E0517 01:11:17.647143 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.647212 kubelet[1906]: W0517 01:11:17.647183 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.647492 kubelet[1906]: E0517 01:11:17.647218 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.647727 kubelet[1906]: E0517 01:11:17.647701 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.647727 kubelet[1906]: W0517 01:11:17.647723 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.647838 kubelet[1906]: E0517 01:11:17.647729 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.647968 kubelet[1906]: E0517 01:11:17.647928 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.647968 kubelet[1906]: W0517 01:11:17.647935 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.647968 kubelet[1906]: E0517 01:11:17.647940 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.648111 kubelet[1906]: E0517 01:11:17.648106 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.648134 kubelet[1906]: W0517 01:11:17.648111 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.648134 kubelet[1906]: E0517 01:11:17.648116 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.648219 kubelet[1906]: E0517 01:11:17.648214 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.648237 kubelet[1906]: W0517 01:11:17.648219 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.648237 kubelet[1906]: E0517 01:11:17.648224 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.648367 kubelet[1906]: E0517 01:11:17.648301 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.648367 kubelet[1906]: W0517 01:11:17.648322 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.648367 kubelet[1906]: E0517 01:11:17.648326 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.648520 kubelet[1906]: E0517 01:11:17.648498 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.648520 kubelet[1906]: W0517 01:11:17.648504 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.648520 kubelet[1906]: E0517 01:11:17.648510 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.648613 kubelet[1906]: E0517 01:11:17.648605 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.648635 kubelet[1906]: W0517 01:11:17.648613 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.648635 kubelet[1906]: E0517 01:11:17.648621 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.648706 kubelet[1906]: E0517 01:11:17.648701 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.648727 kubelet[1906]: W0517 01:11:17.648706 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.648727 kubelet[1906]: E0517 01:11:17.648711 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.648807 kubelet[1906]: E0517 01:11:17.648802 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.648828 kubelet[1906]: W0517 01:11:17.648807 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.648828 kubelet[1906]: E0517 01:11:17.648812 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.648889 kubelet[1906]: E0517 01:11:17.648885 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.648915 kubelet[1906]: W0517 01:11:17.648889 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.648915 kubelet[1906]: E0517 01:11:17.648894 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.648983 kubelet[1906]: E0517 01:11:17.648978 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.648983 kubelet[1906]: W0517 01:11:17.648982 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.649068 kubelet[1906]: E0517 01:11:17.648987 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.649166 kubelet[1906]: E0517 01:11:17.649157 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.649205 kubelet[1906]: W0517 01:11:17.649166 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.649205 kubelet[1906]: E0517 01:11:17.649176 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.649292 kubelet[1906]: E0517 01:11:17.649285 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.649292 kubelet[1906]: W0517 01:11:17.649290 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.649354 kubelet[1906]: E0517 01:11:17.649301 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.649385 kubelet[1906]: E0517 01:11:17.649382 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.649417 kubelet[1906]: W0517 01:11:17.649387 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.649417 kubelet[1906]: E0517 01:11:17.649392 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.649485 kubelet[1906]: E0517 01:11:17.649467 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.649485 kubelet[1906]: W0517 01:11:17.649471 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.649485 kubelet[1906]: E0517 01:11:17.649476 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.650341 kubelet[1906]: E0517 01:11:17.650313 1906 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 01:11:17.650341 kubelet[1906]: W0517 01:11:17.650340 1906 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 01:11:17.650459 kubelet[1906]: E0517 01:11:17.650345 1906 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 01:11:17.772119 env[1553]: time="2025-05-17T01:11:17.771984904Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-54r2s,Uid:3ab2fe89-199b-48da-b89f-b5fd01b6a14e,Namespace:calico-system,Attempt:0,}" May 17 01:11:17.775167 env[1553]: time="2025-05-17T01:11:17.775036405Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9lhgl,Uid:428e7b10-5b7f-4338-8289-f57d67cb9bbf,Namespace:kube-system,Attempt:0,}" May 17 01:11:18.394020 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2805936746.mount: Deactivated successfully. May 17 01:11:18.395495 env[1553]: time="2025-05-17T01:11:18.395459407Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:18.396514 env[1553]: time="2025-05-17T01:11:18.396472969Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:18.397068 env[1553]: time="2025-05-17T01:11:18.397032735Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:18.397718 env[1553]: time="2025-05-17T01:11:18.397704712Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:18.398107 env[1553]: time="2025-05-17T01:11:18.398097046Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:18.399399 env[1553]: time="2025-05-17T01:11:18.399387327Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:18.400728 env[1553]: time="2025-05-17T01:11:18.400685925Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:18.401198 env[1553]: time="2025-05-17T01:11:18.401187942Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:18.407882 env[1553]: time="2025-05-17T01:11:18.407834945Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 01:11:18.407882 env[1553]: time="2025-05-17T01:11:18.407874603Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 01:11:18.407882 env[1553]: time="2025-05-17T01:11:18.407881727Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 01:11:18.408024 env[1553]: time="2025-05-17T01:11:18.407965052Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ad6540b049d81fe29f95438446fa2422acaab3ecaff3be4b2b9f905e798b0f9e pid=2005 runtime=io.containerd.runc.v2 May 17 01:11:18.409131 env[1553]: time="2025-05-17T01:11:18.409104835Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 01:11:18.409131 env[1553]: time="2025-05-17T01:11:18.409123022Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 01:11:18.409131 env[1553]: time="2025-05-17T01:11:18.409129857Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 01:11:18.409210 env[1553]: time="2025-05-17T01:11:18.409189701Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5556461a087c80191c6035c9d59e4b422a2cd4138860854e9231d185ee9d310f pid=2019 runtime=io.containerd.runc.v2 May 17 01:11:18.410877 kubelet[1906]: E0517 01:11:18.410860 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:18.414881 systemd[1]: Started cri-containerd-5556461a087c80191c6035c9d59e4b422a2cd4138860854e9231d185ee9d310f.scope. May 17 01:11:18.415534 systemd[1]: Started cri-containerd-ad6540b049d81fe29f95438446fa2422acaab3ecaff3be4b2b9f905e798b0f9e.scope. May 17 01:11:18.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit: BPF prog-id=61 op=LOAD May 17 01:11:18.420000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2005 pid=2026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:18.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164363534306230343964383166653239663935343338343436666132 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2005 pid=2026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:18.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164363534306230343964383166653239663935343338343436666132 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit: BPF prog-id=62 op=LOAD May 17 01:11:18.420000 audit[2026]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000f5d80 items=0 ppid=2005 pid=2026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:18.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164363534306230343964383166653239663935343338343436666132 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit: BPF prog-id=63 op=LOAD May 17 01:11:18.420000 audit[2026]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000f5dc8 items=0 ppid=2005 pid=2026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:18.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164363534306230343964383166653239663935343338343436666132 May 17 01:11:18.420000 audit: BPF prog-id=63 op=UNLOAD May 17 01:11:18.420000 audit: BPF prog-id=62 op=UNLOAD May 17 01:11:18.420000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { perfmon } for pid=2026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[2026]: AVC avc: denied { bpf } for pid=2026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit: BPF prog-id=64 op=LOAD May 17 01:11:18.420000 audit[2026]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003d01d8 items=0 ppid=2005 pid=2026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:18.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164363534306230343964383166653239663935343338343436666132 May 17 01:11:18.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit: BPF prog-id=65 op=LOAD May 17 01:11:18.421000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2019 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:18.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535353634363161303837633830313931633630333563396435396534 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2019 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:18.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535353634363161303837633830313931633630333563396435396534 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit: BPF prog-id=66 op=LOAD May 17 01:11:18.421000 audit[2031]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000304550 items=0 ppid=2019 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:18.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535353634363161303837633830313931633630333563396435396534 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit: BPF prog-id=67 op=LOAD May 17 01:11:18.421000 audit[2031]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000304598 items=0 ppid=2019 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:18.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535353634363161303837633830313931633630333563396435396534 May 17 01:11:18.421000 audit: BPF prog-id=67 op=UNLOAD May 17 01:11:18.421000 audit: BPF prog-id=66 op=UNLOAD May 17 01:11:18.421000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:18.421000 audit: BPF prog-id=68 op=LOAD May 17 01:11:18.421000 audit[2031]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003049a8 items=0 ppid=2019 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:18.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535353634363161303837633830313931633630333563396435396534 May 17 01:11:18.425393 env[1553]: time="2025-05-17T01:11:18.425368208Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-54r2s,Uid:3ab2fe89-199b-48da-b89f-b5fd01b6a14e,Namespace:calico-system,Attempt:0,} returns sandbox id \"ad6540b049d81fe29f95438446fa2422acaab3ecaff3be4b2b9f905e798b0f9e\"" May 17 01:11:18.426458 env[1553]: time="2025-05-17T01:11:18.426410923Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 01:11:18.426627 env[1553]: time="2025-05-17T01:11:18.426611864Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9lhgl,Uid:428e7b10-5b7f-4338-8289-f57d67cb9bbf,Namespace:kube-system,Attempt:0,} returns sandbox id \"5556461a087c80191c6035c9d59e4b422a2cd4138860854e9231d185ee9d310f\"" May 17 01:11:18.572365 kubelet[1906]: E0517 01:11:18.572307 1906 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gpw96" podUID="5628b461-13a4-4f69-b35b-e90e955ae865" May 17 01:11:19.411990 kubelet[1906]: E0517 01:11:19.411867 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:19.951110 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1275006676.mount: Deactivated successfully. May 17 01:11:20.029534 env[1553]: time="2025-05-17T01:11:20.029487923Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:20.030506 env[1553]: time="2025-05-17T01:11:20.030484226Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:20.031136 env[1553]: time="2025-05-17T01:11:20.031123748Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:20.032005 env[1553]: time="2025-05-17T01:11:20.031991085Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:20.032247 env[1553]: time="2025-05-17T01:11:20.032234949Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 01:11:20.033048 env[1553]: time="2025-05-17T01:11:20.033006738Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.1\"" May 17 01:11:20.034187 env[1553]: time="2025-05-17T01:11:20.034147170Z" level=info msg="CreateContainer within sandbox \"ad6540b049d81fe29f95438446fa2422acaab3ecaff3be4b2b9f905e798b0f9e\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 01:11:20.039296 env[1553]: time="2025-05-17T01:11:20.039248763Z" level=info msg="CreateContainer within sandbox \"ad6540b049d81fe29f95438446fa2422acaab3ecaff3be4b2b9f905e798b0f9e\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"8a11dee136b0a7d9b32b27c9ce6c5b0a63f8052a1d22d1a0766a412647fbb1bb\"" May 17 01:11:20.039677 env[1553]: time="2025-05-17T01:11:20.039627904Z" level=info msg="StartContainer for \"8a11dee136b0a7d9b32b27c9ce6c5b0a63f8052a1d22d1a0766a412647fbb1bb\"" May 17 01:11:20.048989 systemd[1]: Started cri-containerd-8a11dee136b0a7d9b32b27c9ce6c5b0a63f8052a1d22d1a0766a412647fbb1bb.scope. May 17 01:11:20.055000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.061847 kernel: kauditd_printk_skb: 354 callbacks suppressed May 17 01:11:20.061914 kernel: audit: type=1400 audit(1747444280.055:445): avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.055000 audit[2084]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001956b0 a2=3c a3=7f22a4299518 items=0 ppid=2005 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:20.149310 kernel: audit: type=1300 audit(1747444280.055:445): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001956b0 a2=3c a3=7f22a4299518 items=0 ppid=2005 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:20.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861313164656531333662306137643962333262323763396365366335 May 17 01:11:20.150323 kernel: audit: type=1327 audit(1747444280.055:445): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861313164656531333662306137643962333262323763396365366335 May 17 01:11:20.055000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.230328 kernel: audit: type=1400 audit(1747444280.055:446): avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.055000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.343942 kernel: audit: type=1400 audit(1747444280.055:446): avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.343980 kernel: audit: type=1400 audit(1747444280.055:446): avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.055000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.349029 env[1553]: time="2025-05-17T01:11:20.349005890Z" level=info msg="StartContainer for \"8a11dee136b0a7d9b32b27c9ce6c5b0a63f8052a1d22d1a0766a412647fbb1bb\" returns successfully" May 17 01:11:20.055000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.403670 systemd[1]: cri-containerd-8a11dee136b0a7d9b32b27c9ce6c5b0a63f8052a1d22d1a0766a412647fbb1bb.scope: Deactivated successfully. May 17 01:11:20.404308 kernel: audit: type=1400 audit(1747444280.055:446): avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.412553 kubelet[1906]: E0517 01:11:20.412530 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:20.055000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.526989 kernel: audit: type=1400 audit(1747444280.055:446): avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.527085 kernel: audit: type=1400 audit(1747444280.055:446): avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.055000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.528681 env[1553]: time="2025-05-17T01:11:20.528649867Z" level=info msg="shim disconnected" id=8a11dee136b0a7d9b32b27c9ce6c5b0a63f8052a1d22d1a0766a412647fbb1bb May 17 01:11:20.528799 env[1553]: time="2025-05-17T01:11:20.528681810Z" level=warning msg="cleaning up after shim disconnected" id=8a11dee136b0a7d9b32b27c9ce6c5b0a63f8052a1d22d1a0766a412647fbb1bb namespace=k8s.io May 17 01:11:20.528799 env[1553]: time="2025-05-17T01:11:20.528689041Z" level=info msg="cleaning up dead shim" May 17 01:11:20.532193 env[1553]: time="2025-05-17T01:11:20.532172617Z" level=warning msg="cleanup warnings time=\"2025-05-17T01:11:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2125 runtime=io.containerd.runc.v2\n" May 17 01:11:20.572739 kubelet[1906]: E0517 01:11:20.572714 1906 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gpw96" podUID="5628b461-13a4-4f69-b35b-e90e955ae865" May 17 01:11:20.055000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.653552 kernel: audit: type=1400 audit(1747444280.055:446): avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.055000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.055000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.055000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.055000 audit: BPF prog-id=69 op=LOAD May 17 01:11:20.055000 audit[2084]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001959d8 a2=78 a3=c000275ba8 items=0 ppid=2005 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:20.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861313164656531333662306137643962333262323763396365366335 May 17 01:11:20.082000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.082000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.082000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.082000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.082000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.082000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.082000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.082000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.082000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.082000 audit: BPF prog-id=70 op=LOAD May 17 01:11:20.082000 audit[2084]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000195770 a2=78 a3=c000275bf8 items=0 ppid=2005 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:20.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861313164656531333662306137643962333262323763396365366335 May 17 01:11:20.228000 audit: BPF prog-id=70 op=UNLOAD May 17 01:11:20.228000 audit: BPF prog-id=69 op=UNLOAD May 17 01:11:20.228000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.228000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.228000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.228000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.228000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.228000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.228000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.228000 audit[2084]: AVC avc: denied { perfmon } for pid=2084 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.228000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.228000 audit[2084]: AVC avc: denied { bpf } for pid=2084 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:20.228000 audit: BPF prog-id=71 op=LOAD May 17 01:11:20.228000 audit[2084]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000195c30 a2=78 a3=c000275c88 items=0 ppid=2005 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:20.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861313164656531333662306137643962333262323763396365366335 May 17 01:11:20.590000 audit: BPF prog-id=71 op=UNLOAD May 17 01:11:20.921175 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8a11dee136b0a7d9b32b27c9ce6c5b0a63f8052a1d22d1a0766a412647fbb1bb-rootfs.mount: Deactivated successfully. May 17 01:11:20.989272 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2617437751.mount: Deactivated successfully. May 17 01:11:21.412675 kubelet[1906]: E0517 01:11:21.412617 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:21.421398 env[1553]: time="2025-05-17T01:11:21.421359327Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:21.422170 env[1553]: time="2025-05-17T01:11:21.422115973Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b79c189b052cdbe0e837d0caa6faf1d9fd696d8664fcc462f67d9ea51f26fef2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:21.423239 env[1553]: time="2025-05-17T01:11:21.423224383Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:21.423946 env[1553]: time="2025-05-17T01:11:21.423932484Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:7ddf379897139ae8ade8b33cb9373b70c632a4d5491da6e234f5d830e0a50807,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:21.424220 env[1553]: time="2025-05-17T01:11:21.424205882Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.1\" returns image reference \"sha256:b79c189b052cdbe0e837d0caa6faf1d9fd696d8664fcc462f67d9ea51f26fef2\"" May 17 01:11:21.424808 env[1553]: time="2025-05-17T01:11:21.424779971Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 01:11:21.426011 env[1553]: time="2025-05-17T01:11:21.425976217Z" level=info msg="CreateContainer within sandbox \"5556461a087c80191c6035c9d59e4b422a2cd4138860854e9231d185ee9d310f\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 01:11:21.431916 env[1553]: time="2025-05-17T01:11:21.431874494Z" level=info msg="CreateContainer within sandbox \"5556461a087c80191c6035c9d59e4b422a2cd4138860854e9231d185ee9d310f\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"20caec5e239a94f680656bd0b8a91e4ba5e31d434b8f29312055b3dbf3ebb680\"" May 17 01:11:21.432210 env[1553]: time="2025-05-17T01:11:21.432174974Z" level=info msg="StartContainer for \"20caec5e239a94f680656bd0b8a91e4ba5e31d434b8f29312055b3dbf3ebb680\"" May 17 01:11:21.441104 systemd[1]: Started cri-containerd-20caec5e239a94f680656bd0b8a91e4ba5e31d434b8f29312055b3dbf3ebb680.scope. May 17 01:11:21.449000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fc61861fc68 items=0 ppid=2019 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230636165633565323339613934663638303635366264306238613931 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit: BPF prog-id=72 op=LOAD May 17 01:11:21.449000 audit[2150]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000098c98 items=0 ppid=2019 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230636165633565323339613934663638303635366264306238613931 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit: BPF prog-id=73 op=LOAD May 17 01:11:21.449000 audit[2150]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000098ce8 items=0 ppid=2019 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230636165633565323339613934663638303635366264306238613931 May 17 01:11:21.449000 audit: BPF prog-id=73 op=UNLOAD May 17 01:11:21.449000 audit: BPF prog-id=72 op=UNLOAD May 17 01:11:21.449000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { perfmon } for pid=2150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit[2150]: AVC avc: denied { bpf } for pid=2150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:21.449000 audit: BPF prog-id=74 op=LOAD May 17 01:11:21.449000 audit[2150]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000098d78 items=0 ppid=2019 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230636165633565323339613934663638303635366264306238613931 May 17 01:11:21.455829 env[1553]: time="2025-05-17T01:11:21.455782536Z" level=info msg="StartContainer for \"20caec5e239a94f680656bd0b8a91e4ba5e31d434b8f29312055b3dbf3ebb680\" returns successfully" May 17 01:11:21.573000 audit[2224]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:21.573000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc40f91a70 a2=0 a3=7ffc40f91a5c items=0 ppid=2161 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.573000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 01:11:21.573000 audit[2225]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.573000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdbaf2bc80 a2=0 a3=7ffdbaf2bc6c items=0 ppid=2161 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.573000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 01:11:21.574000 audit[2227]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:21.574000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd272e49d0 a2=0 a3=7ffd272e49bc items=0 ppid=2161 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.574000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 01:11:21.574000 audit[2228]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.574000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc454c4f00 a2=0 a3=7ffc454c4eec items=0 ppid=2161 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.574000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 01:11:21.574000 audit[2232]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.574000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb098ff40 a2=0 a3=7ffcb098ff2c items=0 ppid=2161 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.574000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 01:11:21.574000 audit[2231]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:21.574000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe1386aed0 a2=0 a3=7ffe1386aebc items=0 ppid=2161 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.574000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 01:11:21.588898 kubelet[1906]: I0517 01:11:21.588742 1906 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-9lhgl" podStartSLOduration=2.591002827 podStartE2EDuration="5.58870829s" podCreationTimestamp="2025-05-17 01:11:16 +0000 UTC" firstStartedPulling="2025-05-17 01:11:18.426995653 +0000 UTC m=+2.454014326" lastFinishedPulling="2025-05-17 01:11:21.42470112 +0000 UTC m=+5.451719789" observedRunningTime="2025-05-17 01:11:21.588509928 +0000 UTC m=+5.615528664" watchObservedRunningTime="2025-05-17 01:11:21.58870829 +0000 UTC m=+5.615727005" May 17 01:11:21.677000 audit[2233]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:21.677000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc9b8e07c0 a2=0 a3=7ffc9b8e07ac items=0 ppid=2161 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.677000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 01:11:21.683000 audit[2235]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:21.683000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffebaeb8f00 a2=0 a3=7ffebaeb8eec items=0 ppid=2161 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.683000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 01:11:21.692000 audit[2238]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:21.692000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc7f14a490 a2=0 a3=7ffc7f14a47c items=0 ppid=2161 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.692000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 01:11:21.694000 audit[2239]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:21.694000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc1426570 a2=0 a3=7fffc142655c items=0 ppid=2161 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.694000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 01:11:21.700000 audit[2241]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:21.700000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff87e03e60 a2=0 a3=7fff87e03e4c items=0 ppid=2161 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.700000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 01:11:21.703000 audit[2242]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:21.703000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd47093d0 a2=0 a3=7ffdd47093bc items=0 ppid=2161 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.703000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 01:11:21.710000 audit[2244]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2244 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:21.710000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff880fbf00 a2=0 a3=7fff880fbeec items=0 ppid=2161 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.710000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 01:11:21.718000 audit[2247]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:21.718000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe449f2660 a2=0 a3=7ffe449f264c items=0 ppid=2161 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.718000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 01:11:21.721000 audit[2248]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:21.721000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde69a3680 a2=0 a3=7ffde69a366c items=0 ppid=2161 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.721000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 01:11:21.727000 audit[2250]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2250 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:21.727000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe61ce1500 a2=0 a3=7ffe61ce14ec items=0 ppid=2161 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.727000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 01:11:21.730000 audit[2251]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:21.730000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc41790900 a2=0 a3=7ffc417908ec items=0 ppid=2161 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.730000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 01:11:21.737000 audit[2253]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:21.737000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd4825990 a2=0 a3=7ffdd482597c items=0 ppid=2161 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.737000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 01:11:21.746000 audit[2256]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:21.746000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe041c1220 a2=0 a3=7ffe041c120c items=0 ppid=2161 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 01:11:21.755000 audit[2259]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:21.755000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe94e14e90 a2=0 a3=7ffe94e14e7c items=0 ppid=2161 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.755000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 01:11:21.758000 audit[2260]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:21.758000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffefcddad60 a2=0 a3=7ffefcddad4c items=0 ppid=2161 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.758000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 01:11:21.763000 audit[2262]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:21.763000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdd7e361f0 a2=0 a3=7ffdd7e361dc items=0 ppid=2161 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.763000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 01:11:21.822000 audit[2266]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:21.822000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff0a06c400 a2=0 a3=7fff0a06c3ec items=0 ppid=2161 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.822000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 01:11:21.823000 audit[2267]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:21.823000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6d9b42d0 a2=0 a3=7ffc6d9b42bc items=0 ppid=2161 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.823000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 01:11:21.825000 audit[2269]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 01:11:21.825000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd1ed4bf80 a2=0 a3=7ffd1ed4bf6c items=0 ppid=2161 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.825000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 01:11:21.850000 audit[2275]: NETFILTER_CFG table=filter:39 family=2 entries=7 op=nft_register_rule pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:11:21.850000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc2b6825e0 a2=0 a3=7ffc2b6825cc items=0 ppid=2161 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.850000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:11:21.881000 audit[2275]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:11:21.881000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffc2b6825e0 a2=0 a3=7ffc2b6825cc items=0 ppid=2161 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.881000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:11:21.891000 audit[2284]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.891000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff02931530 a2=0 a3=7fff0293151c items=0 ppid=2161 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.891000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 01:11:21.893000 audit[2286]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.893000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffffe654a00 a2=0 a3=7ffffe6549ec items=0 ppid=2161 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.893000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 01:11:21.896000 audit[2289]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.896000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd28d70ee0 a2=0 a3=7ffd28d70ecc items=0 ppid=2161 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.896000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 01:11:21.897000 audit[2290]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.897000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdaa049e90 a2=0 a3=7ffdaa049e7c items=0 ppid=2161 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.897000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 01:11:21.900000 audit[2292]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.900000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe993e7910 a2=0 a3=7ffe993e78fc items=0 ppid=2161 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.900000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 01:11:21.901000 audit[2293]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.901000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1f490480 a2=0 a3=7ffd1f49046c items=0 ppid=2161 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.901000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 01:11:21.903000 audit[2295]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.903000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeb3effba0 a2=0 a3=7ffeb3effb8c items=0 ppid=2161 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.903000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 01:11:21.907000 audit[2298]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.907000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff9a19e010 a2=0 a3=7fff9a19dffc items=0 ppid=2161 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.907000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 01:11:21.908000 audit[2299]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.908000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffecd389d10 a2=0 a3=7ffecd389cfc items=0 ppid=2161 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.908000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 01:11:21.911000 audit[2301]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.911000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffedbc0cb60 a2=0 a3=7ffedbc0cb4c items=0 ppid=2161 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.911000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 01:11:21.912000 audit[2302]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.912000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd113cccc0 a2=0 a3=7ffd113cccac items=0 ppid=2161 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.912000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 01:11:21.916000 audit[2304]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.916000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe5d5600d0 a2=0 a3=7ffe5d5600bc items=0 ppid=2161 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.916000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 01:11:21.922000 audit[2307]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.922000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff644bfd10 a2=0 a3=7fff644bfcfc items=0 ppid=2161 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.922000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 01:11:21.927000 audit[2310]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.927000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe1f24e970 a2=0 a3=7ffe1f24e95c items=0 ppid=2161 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.927000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 01:11:21.929000 audit[2311]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.929000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffde13acfa0 a2=0 a3=7ffde13acf8c items=0 ppid=2161 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.929000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 01:11:21.933000 audit[2313]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.933000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffcbbb2f70 a2=0 a3=7fffcbbb2f5c items=0 ppid=2161 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.933000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 01:11:21.938000 audit[2316]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.938000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd1bd325b0 a2=0 a3=7ffd1bd3259c items=0 ppid=2161 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.938000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 01:11:21.940000 audit[2317]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.940000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe495deb90 a2=0 a3=7ffe495deb7c items=0 ppid=2161 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.940000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 01:11:21.943000 audit[2319]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.943000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcbcc61e90 a2=0 a3=7ffcbcc61e7c items=0 ppid=2161 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.943000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 01:11:21.945000 audit[2320]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.945000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7abacec0 a2=0 a3=7ffe7abaceac items=0 ppid=2161 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.945000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 01:11:21.950000 audit[2322]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.950000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffce251f230 a2=0 a3=7ffce251f21c items=0 ppid=2161 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.950000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 01:11:21.959000 audit[2325]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 01:11:21.959000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe39ef41b0 a2=0 a3=7ffe39ef419c items=0 ppid=2161 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.959000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 01:11:21.966000 audit[2327]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 01:11:21.966000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffc4f0b29d0 a2=0 a3=7ffc4f0b29bc items=0 ppid=2161 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.966000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:11:21.968000 audit[2327]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 01:11:21.968000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc4f0b29d0 a2=0 a3=7ffc4f0b29bc items=0 ppid=2161 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:21.968000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:11:22.413446 kubelet[1906]: E0517 01:11:22.413233 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:22.573219 kubelet[1906]: E0517 01:11:22.573114 1906 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gpw96" podUID="5628b461-13a4-4f69-b35b-e90e955ae865" May 17 01:11:23.414049 kubelet[1906]: E0517 01:11:23.413965 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:24.414403 kubelet[1906]: E0517 01:11:24.414343 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:24.573393 kubelet[1906]: E0517 01:11:24.573281 1906 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gpw96" podUID="5628b461-13a4-4f69-b35b-e90e955ae865" May 17 01:11:25.415288 kubelet[1906]: E0517 01:11:25.415266 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:25.655556 env[1553]: time="2025-05-17T01:11:25.655514739Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:25.656160 env[1553]: time="2025-05-17T01:11:25.656144836Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:25.656979 env[1553]: time="2025-05-17T01:11:25.656926277Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:25.657877 env[1553]: time="2025-05-17T01:11:25.657864117Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:25.658137 env[1553]: time="2025-05-17T01:11:25.658125883Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 01:11:25.660831 env[1553]: time="2025-05-17T01:11:25.660794842Z" level=info msg="CreateContainer within sandbox \"ad6540b049d81fe29f95438446fa2422acaab3ecaff3be4b2b9f905e798b0f9e\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 01:11:25.666606 env[1553]: time="2025-05-17T01:11:25.666510502Z" level=info msg="CreateContainer within sandbox \"ad6540b049d81fe29f95438446fa2422acaab3ecaff3be4b2b9f905e798b0f9e\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"4e9b202e5e90b5f5ac25ec5a698d717d2a35e7fd090182a74a96124e5a349537\"" May 17 01:11:25.666860 env[1553]: time="2025-05-17T01:11:25.666802116Z" level=info msg="StartContainer for \"4e9b202e5e90b5f5ac25ec5a698d717d2a35e7fd090182a74a96124e5a349537\"" May 17 01:11:25.677852 systemd[1]: Started cri-containerd-4e9b202e5e90b5f5ac25ec5a698d717d2a35e7fd090182a74a96124e5a349537.scope. May 17 01:11:25.683000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.711305 kernel: kauditd_printk_skb: 230 callbacks suppressed May 17 01:11:25.711343 kernel: audit: type=1400 audit(1747444285.683:509): avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.683000 audit[2335]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fb4807bec18 items=0 ppid=2005 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:25.871541 kernel: audit: type=1300 audit(1747444285.683:509): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fb4807bec18 items=0 ppid=2005 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:25.871565 kernel: audit: type=1327 audit(1747444285.683:509): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465396232303265356539306235663561633235656335613639386437 May 17 01:11:25.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465396232303265356539306235663561633235656335613639386437 May 17 01:11:25.964636 kernel: audit: type=1400 audit(1747444285.683:510): avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.683000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:26.027981 kernel: audit: type=1400 audit(1747444285.683:510): avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.683000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:26.091190 kernel: audit: type=1400 audit(1747444285.683:510): avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.683000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:26.155991 kernel: audit: type=1400 audit(1747444285.683:510): avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.683000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:26.162157 env[1553]: time="2025-05-17T01:11:26.162105338Z" level=info msg="StartContainer for \"4e9b202e5e90b5f5ac25ec5a698d717d2a35e7fd090182a74a96124e5a349537\" returns successfully" May 17 01:11:26.220126 kernel: audit: type=1400 audit(1747444285.683:510): avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.683000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:26.283704 kernel: audit: type=1400 audit(1747444285.683:510): avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.683000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:26.347262 kernel: audit: type=1400 audit(1747444285.683:510): avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.683000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.683000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.683000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.683000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.683000 audit: BPF prog-id=75 op=LOAD May 17 01:11:25.683000 audit[2335]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00027c4a8 items=0 ppid=2005 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:25.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465396232303265356539306235663561633235656335613639386437 May 17 01:11:25.774000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.774000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.774000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.774000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.774000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.774000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.774000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.774000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.774000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.774000 audit: BPF prog-id=76 op=LOAD May 17 01:11:25.774000 audit[2335]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00027c4f8 items=0 ppid=2005 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:25.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465396232303265356539306235663561633235656335613639386437 May 17 01:11:25.963000 audit: BPF prog-id=76 op=UNLOAD May 17 01:11:25.963000 audit: BPF prog-id=75 op=UNLOAD May 17 01:11:25.963000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.963000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.963000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.963000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.963000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.963000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.963000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.963000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.963000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.963000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:25.963000 audit: BPF prog-id=77 op=LOAD May 17 01:11:25.963000 audit[2335]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027c588 items=0 ppid=2005 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:25.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465396232303265356539306235663561633235656335613639386437 May 17 01:11:26.416168 kubelet[1906]: E0517 01:11:26.416122 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:26.573360 kubelet[1906]: E0517 01:11:26.573108 1906 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gpw96" podUID="5628b461-13a4-4f69-b35b-e90e955ae865" May 17 01:11:26.976584 env[1553]: time="2025-05-17T01:11:26.976425390Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 01:11:26.980453 systemd[1]: cri-containerd-4e9b202e5e90b5f5ac25ec5a698d717d2a35e7fd090182a74a96124e5a349537.scope: Deactivated successfully. May 17 01:11:26.998000 audit: BPF prog-id=77 op=UNLOAD May 17 01:11:27.022680 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4e9b202e5e90b5f5ac25ec5a698d717d2a35e7fd090182a74a96124e5a349537-rootfs.mount: Deactivated successfully. May 17 01:11:27.033075 kubelet[1906]: I0517 01:11:27.033029 1906 kubelet_node_status.go:501] "Fast updating node status as it just became ready" May 17 01:11:27.416691 kubelet[1906]: E0517 01:11:27.416451 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:27.633349 env[1553]: time="2025-05-17T01:11:27.633227938Z" level=info msg="shim disconnected" id=4e9b202e5e90b5f5ac25ec5a698d717d2a35e7fd090182a74a96124e5a349537 May 17 01:11:27.633657 env[1553]: time="2025-05-17T01:11:27.633351085Z" level=warning msg="cleaning up after shim disconnected" id=4e9b202e5e90b5f5ac25ec5a698d717d2a35e7fd090182a74a96124e5a349537 namespace=k8s.io May 17 01:11:27.633657 env[1553]: time="2025-05-17T01:11:27.633383306Z" level=info msg="cleaning up dead shim" May 17 01:11:27.641216 env[1553]: time="2025-05-17T01:11:27.641189137Z" level=warning msg="cleanup warnings time=\"2025-05-17T01:11:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2388 runtime=io.containerd.runc.v2\n" May 17 01:11:28.027713 systemd[1]: Created slice kubepods-besteffort-pode42cf67d_88c7_44e5_ae6b_336c0d7ac653.slice. May 17 01:11:28.112316 kubelet[1906]: I0517 01:11:28.112261 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f92gw\" (UniqueName: \"kubernetes.io/projected/e42cf67d-88c7-44e5-ae6b-336c0d7ac653-kube-api-access-f92gw\") pod \"nginx-deployment-7fcdb87857-zkhdf\" (UID: \"e42cf67d-88c7-44e5-ae6b-336c0d7ac653\") " pod="default/nginx-deployment-7fcdb87857-zkhdf" May 17 01:11:28.330585 env[1553]: time="2025-05-17T01:11:28.330412350Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-zkhdf,Uid:e42cf67d-88c7-44e5-ae6b-336c0d7ac653,Namespace:default,Attempt:0,}" May 17 01:11:28.370011 env[1553]: time="2025-05-17T01:11:28.369934296Z" level=error msg="Failed to destroy network for sandbox \"02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:11:28.370201 env[1553]: time="2025-05-17T01:11:28.370180112Z" level=error msg="encountered an error cleaning up failed sandbox \"02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:11:28.370249 env[1553]: time="2025-05-17T01:11:28.370218968Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-zkhdf,Uid:e42cf67d-88c7-44e5-ae6b-336c0d7ac653,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:11:28.370442 kubelet[1906]: E0517 01:11:28.370384 1906 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:11:28.370442 kubelet[1906]: E0517 01:11:28.370435 1906 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-zkhdf" May 17 01:11:28.370542 kubelet[1906]: E0517 01:11:28.370454 1906 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-zkhdf" May 17 01:11:28.370542 kubelet[1906]: E0517 01:11:28.370499 1906 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-zkhdf_default(e42cf67d-88c7-44e5-ae6b-336c0d7ac653)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-zkhdf_default(e42cf67d-88c7-44e5-ae6b-336c0d7ac653)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-zkhdf" podUID="e42cf67d-88c7-44e5-ae6b-336c0d7ac653" May 17 01:11:28.371433 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697-shm.mount: Deactivated successfully. May 17 01:11:28.417190 kubelet[1906]: E0517 01:11:28.417105 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:28.587334 systemd[1]: Created slice kubepods-besteffort-pod5628b461_13a4_4f69_b35b_e90e955ae865.slice. May 17 01:11:28.592481 env[1553]: time="2025-05-17T01:11:28.592392687Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gpw96,Uid:5628b461-13a4-4f69-b35b-e90e955ae865,Namespace:calico-system,Attempt:0,}" May 17 01:11:28.606884 kubelet[1906]: I0517 01:11:28.606814 1906 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697" May 17 01:11:28.607417 env[1553]: time="2025-05-17T01:11:28.607355671Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 01:11:28.608219 env[1553]: time="2025-05-17T01:11:28.608145115Z" level=info msg="StopPodSandbox for \"02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697\"" May 17 01:11:28.646336 env[1553]: time="2025-05-17T01:11:28.646236300Z" level=error msg="StopPodSandbox for \"02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697\" failed" error="failed to destroy network for sandbox \"02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:11:28.646549 kubelet[1906]: E0517 01:11:28.646506 1906 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697" May 17 01:11:28.646659 kubelet[1906]: E0517 01:11:28.646574 1906 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697"} May 17 01:11:28.646730 kubelet[1906]: E0517 01:11:28.646646 1906 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e42cf67d-88c7-44e5-ae6b-336c0d7ac653\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 01:11:28.646730 kubelet[1906]: E0517 01:11:28.646701 1906 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e42cf67d-88c7-44e5-ae6b-336c0d7ac653\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-zkhdf" podUID="e42cf67d-88c7-44e5-ae6b-336c0d7ac653" May 17 01:11:28.668673 env[1553]: time="2025-05-17T01:11:28.668602181Z" level=error msg="Failed to destroy network for sandbox \"f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:11:28.668969 env[1553]: time="2025-05-17T01:11:28.668913793Z" level=error msg="encountered an error cleaning up failed sandbox \"f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:11:28.669047 env[1553]: time="2025-05-17T01:11:28.668961447Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gpw96,Uid:5628b461-13a4-4f69-b35b-e90e955ae865,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:11:28.669163 kubelet[1906]: E0517 01:11:28.669134 1906 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:11:28.669234 kubelet[1906]: E0517 01:11:28.669184 1906 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-gpw96" May 17 01:11:28.669234 kubelet[1906]: E0517 01:11:28.669211 1906 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-gpw96" May 17 01:11:28.669329 kubelet[1906]: E0517 01:11:28.669258 1906 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-gpw96_calico-system(5628b461-13a4-4f69-b35b-e90e955ae865)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-gpw96_calico-system(5628b461-13a4-4f69-b35b-e90e955ae865)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-gpw96" podUID="5628b461-13a4-4f69-b35b-e90e955ae865" May 17 01:11:29.229466 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d-shm.mount: Deactivated successfully. May 17 01:11:29.418028 kubelet[1906]: E0517 01:11:29.417906 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:29.612273 kubelet[1906]: I0517 01:11:29.612055 1906 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d" May 17 01:11:29.613378 env[1553]: time="2025-05-17T01:11:29.613260008Z" level=info msg="StopPodSandbox for \"f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d\"" May 17 01:11:29.636817 env[1553]: time="2025-05-17T01:11:29.636782170Z" level=error msg="StopPodSandbox for \"f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d\" failed" error="failed to destroy network for sandbox \"f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 01:11:29.636963 kubelet[1906]: E0517 01:11:29.636914 1906 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d" May 17 01:11:29.636963 kubelet[1906]: E0517 01:11:29.636944 1906 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d"} May 17 01:11:29.637020 kubelet[1906]: E0517 01:11:29.636967 1906 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5628b461-13a4-4f69-b35b-e90e955ae865\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 01:11:29.637020 kubelet[1906]: E0517 01:11:29.636981 1906 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5628b461-13a4-4f69-b35b-e90e955ae865\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-gpw96" podUID="5628b461-13a4-4f69-b35b-e90e955ae865" May 17 01:11:30.419232 kubelet[1906]: E0517 01:11:30.419114 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:31.419779 kubelet[1906]: E0517 01:11:31.419737 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:32.420092 kubelet[1906]: E0517 01:11:32.420027 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:32.968523 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount552562199.mount: Deactivated successfully. May 17 01:11:32.985317 env[1553]: time="2025-05-17T01:11:32.985265566Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:32.985919 env[1553]: time="2025-05-17T01:11:32.985885007Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:32.986720 env[1553]: time="2025-05-17T01:11:32.986663692Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:32.987458 env[1553]: time="2025-05-17T01:11:32.987421356Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:32.987787 env[1553]: time="2025-05-17T01:11:32.987734070Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 01:11:32.992518 env[1553]: time="2025-05-17T01:11:32.992502809Z" level=info msg="CreateContainer within sandbox \"ad6540b049d81fe29f95438446fa2422acaab3ecaff3be4b2b9f905e798b0f9e\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 01:11:32.998650 env[1553]: time="2025-05-17T01:11:32.998602290Z" level=info msg="CreateContainer within sandbox \"ad6540b049d81fe29f95438446fa2422acaab3ecaff3be4b2b9f905e798b0f9e\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"d6fa51452c55ad271626808b21634283f4401f2d4ab3995efa199e19854bb733\"" May 17 01:11:32.999078 env[1553]: time="2025-05-17T01:11:32.999026418Z" level=info msg="StartContainer for \"d6fa51452c55ad271626808b21634283f4401f2d4ab3995efa199e19854bb733\"" May 17 01:11:33.007331 systemd[1]: Started cri-containerd-d6fa51452c55ad271626808b21634283f4401f2d4ab3995efa199e19854bb733.scope. May 17 01:11:33.015000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.043726 kernel: kauditd_printk_skb: 34 callbacks suppressed May 17 01:11:33.043797 kernel: audit: type=1400 audit(1747444293.015:516): avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.015000 audit[2548]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00013d6b0 a2=3c a3=7feb22308ee8 items=0 ppid=2005 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:33.205708 kernel: audit: type=1300 audit(1747444293.015:516): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00013d6b0 a2=3c a3=7feb22308ee8 items=0 ppid=2005 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:33.205737 kernel: audit: type=1327 audit(1747444293.015:516): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436666135313435326335356164323731363236383038623231363334 May 17 01:11:33.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436666135313435326335356164323731363236383038623231363334 May 17 01:11:33.298985 kernel: audit: type=1400 audit(1747444293.016:517): avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.016000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.362571 kernel: audit: type=1400 audit(1747444293.016:517): avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.016000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.421063 kubelet[1906]: E0517 01:11:33.421020 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:33.426151 kernel: audit: type=1400 audit(1747444293.016:517): avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.016000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.489717 kernel: audit: type=1400 audit(1747444293.016:517): avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.016000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.495098 env[1553]: time="2025-05-17T01:11:33.495048463Z" level=info msg="StartContainer for \"d6fa51452c55ad271626808b21634283f4401f2d4ab3995efa199e19854bb733\" returns successfully" May 17 01:11:33.016000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.617598 kernel: audit: type=1400 audit(1747444293.016:517): avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.617636 kernel: audit: type=1400 audit(1747444293.016:517): avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.016000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.629903 kubelet[1906]: I0517 01:11:33.629882 1906 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-54r2s" podStartSLOduration=3.067736115 podStartE2EDuration="17.629872359s" podCreationTimestamp="2025-05-17 01:11:16 +0000 UTC" firstStartedPulling="2025-05-17 01:11:18.426222441 +0000 UTC m=+2.453241112" lastFinishedPulling="2025-05-17 01:11:32.988358687 +0000 UTC m=+17.015377356" observedRunningTime="2025-05-17 01:11:33.629777089 +0000 UTC m=+17.656795762" watchObservedRunningTime="2025-05-17 01:11:33.629872359 +0000 UTC m=+17.656891029" May 17 01:11:33.016000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.745521 kernel: audit: type=1400 audit(1747444293.016:517): avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.016000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.016000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.016000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.016000 audit: BPF prog-id=78 op=LOAD May 17 01:11:33.016000 audit[2548]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00013d9d8 a2=78 a3=c0003cc2c8 items=0 ppid=2005 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:33.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436666135313435326335356164323731363236383038623231363334 May 17 01:11:33.108000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.108000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.108000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.108000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.108000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.108000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.108000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.108000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.108000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.108000 audit: BPF prog-id=79 op=LOAD May 17 01:11:33.108000 audit[2548]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00013d770 a2=78 a3=c0003cc318 items=0 ppid=2005 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:33.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436666135313435326335356164323731363236383038623231363334 May 17 01:11:33.298000 audit: BPF prog-id=79 op=UNLOAD May 17 01:11:33.298000 audit: BPF prog-id=78 op=UNLOAD May 17 01:11:33.298000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.298000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.298000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.298000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.298000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.298000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.298000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.298000 audit[2548]: AVC avc: denied { perfmon } for pid=2548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.298000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.298000 audit[2548]: AVC avc: denied { bpf } for pid=2548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:33.298000 audit: BPF prog-id=80 op=LOAD May 17 01:11:33.298000 audit[2548]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00013dc30 a2=78 a3=c0003cc3a8 items=0 ppid=2005 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:33.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436666135313435326335356164323731363236383038623231363334 May 17 01:11:33.830054 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 01:11:33.830085 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 01:11:34.421648 kubelet[1906]: E0517 01:11:34.421530 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:35.095000 audit[2682]: AVC avc: denied { write } for pid=2682 comm="tee" name="fd" dev="proc" ino=16142 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 01:11:35.095000 audit[2675]: AVC avc: denied { write } for pid=2675 comm="tee" name="fd" dev="proc" ino=8541 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 01:11:35.095000 audit[2680]: AVC avc: denied { write } for pid=2680 comm="tee" name="fd" dev="proc" ino=28559 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 01:11:35.095000 audit[2682]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff413fe7d4 a2=241 a3=1b6 items=1 ppid=2643 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.095000 audit[2675]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda3f8d7c4 a2=241 a3=1b6 items=1 ppid=2639 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.095000 audit[2680]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc33ae17c5 a2=241 a3=1b6 items=1 ppid=2642 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.095000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 01:11:35.095000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 01:11:35.095000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 01:11:35.095000 audit: PATH item=0 name="/dev/fd/63" inode=16139 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:11:35.095000 audit: PATH item=0 name="/dev/fd/63" inode=8538 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:11:35.095000 audit: PATH item=0 name="/dev/fd/63" inode=28556 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:11:35.095000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 01:11:35.095000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 01:11:35.095000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 01:11:35.095000 audit[2684]: AVC avc: denied { write } for pid=2684 comm="tee" name="fd" dev="proc" ino=29872 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 01:11:35.095000 audit[2684]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee52097d6 a2=241 a3=1b6 items=1 ppid=2640 pid=2684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.095000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 01:11:35.095000 audit: PATH item=0 name="/dev/fd/63" inode=29869 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:11:35.095000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 01:11:35.095000 audit[2681]: AVC avc: denied { write } for pid=2681 comm="tee" name="fd" dev="proc" ino=29047 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 01:11:35.095000 audit[2681]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff021b77d4 a2=241 a3=1b6 items=1 ppid=2638 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.095000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 01:11:35.095000 audit[2685]: AVC avc: denied { write } for pid=2685 comm="tee" name="fd" dev="proc" ino=34026 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 01:11:35.095000 audit: PATH item=0 name="/dev/fd/63" inode=19097 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:11:35.095000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 01:11:35.095000 audit[2685]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdcc4217d4 a2=241 a3=1b6 items=1 ppid=2644 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.095000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 01:11:35.095000 audit: PATH item=0 name="/dev/fd/63" inode=34023 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:11:35.095000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 01:11:35.096000 audit[2678]: AVC avc: denied { write } for pid=2678 comm="tee" name="fd" dev="proc" ino=25183 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 01:11:35.096000 audit[2678]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf247e7d5 a2=241 a3=1b6 items=1 ppid=2645 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.096000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 01:11:35.096000 audit: PATH item=0 name="/dev/fd/63" inode=25180 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:11:35.096000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 01:11:35.151000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.151000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.151000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.151000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.151000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.151000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.151000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.151000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.151000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.151000 audit: BPF prog-id=81 op=LOAD May 17 01:11:35.151000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcbe5b4a00 a2=98 a3=3 items=0 ppid=2650 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.151000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:11:35.151000 audit: BPF prog-id=81 op=UNLOAD May 17 01:11:35.151000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.151000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.151000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.151000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.151000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.151000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.151000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.151000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.151000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.151000 audit: BPF prog-id=82 op=LOAD May 17 01:11:35.151000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcbe5b47f0 a2=94 a3=54428f items=0 ppid=2650 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.151000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:11:35.152000 audit: BPF prog-id=82 op=UNLOAD May 17 01:11:35.152000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.152000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.152000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.152000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.152000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.152000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.152000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.152000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.152000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.152000 audit: BPF prog-id=83 op=LOAD May 17 01:11:35.152000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcbe5b4820 a2=94 a3=2 items=0 ppid=2650 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.152000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:11:35.152000 audit: BPF prog-id=83 op=UNLOAD May 17 01:11:35.240000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.240000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.240000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.240000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.240000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.240000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.240000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.240000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.240000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.240000 audit: BPF prog-id=84 op=LOAD May 17 01:11:35.240000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcbe5b46e0 a2=94 a3=1 items=0 ppid=2650 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.240000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:11:35.240000 audit: BPF prog-id=84 op=UNLOAD May 17 01:11:35.240000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.240000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcbe5b47b0 a2=50 a3=7ffcbe5b4890 items=0 ppid=2650 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.240000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:11:35.247000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbe5b46f0 a2=28 a3=0 items=0 ppid=2650 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.247000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:11:35.247000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbe5b4720 a2=28 a3=0 items=0 ppid=2650 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.247000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:11:35.247000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbe5b4630 a2=28 a3=0 items=0 ppid=2650 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.247000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:11:35.247000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbe5b4740 a2=28 a3=0 items=0 ppid=2650 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.247000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:11:35.247000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbe5b4720 a2=28 a3=0 items=0 ppid=2650 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.247000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:11:35.247000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbe5b4710 a2=28 a3=0 items=0 ppid=2650 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.247000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:11:35.247000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbe5b4740 a2=28 a3=0 items=0 ppid=2650 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.247000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:11:35.247000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbe5b4720 a2=28 a3=0 items=0 ppid=2650 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.247000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:11:35.247000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbe5b4740 a2=28 a3=0 items=0 ppid=2650 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.247000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:11:35.247000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbe5b4710 a2=28 a3=0 items=0 ppid=2650 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.247000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:11:35.247000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbe5b4780 a2=28 a3=0 items=0 ppid=2650 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.247000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:11:35.247000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcbe5b4530 a2=50 a3=1 items=0 ppid=2650 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.247000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:11:35.247000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit: BPF prog-id=85 op=LOAD May 17 01:11:35.247000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcbe5b4530 a2=94 a3=5 items=0 ppid=2650 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.247000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:11:35.247000 audit: BPF prog-id=85 op=UNLOAD May 17 01:11:35.247000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcbe5b45e0 a2=50 a3=1 items=0 ppid=2650 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.247000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:11:35.247000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcbe5b4700 a2=4 a3=38 items=0 ppid=2650 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.247000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:11:35.247000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.247000 audit[2781]: AVC avc: denied { confidentiality } for pid=2781 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:11:35.247000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcbe5b4750 a2=94 a3=6 items=0 ppid=2650 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.247000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:11:35.248000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.248000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.248000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.248000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.248000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.248000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.248000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.248000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.248000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.248000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.248000 audit[2781]: AVC avc: denied { confidentiality } for pid=2781 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:11:35.248000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcbe5b3f00 a2=94 a3=88 items=0 ppid=2650 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.248000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:11:35.248000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.248000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.248000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.248000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.248000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.248000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.248000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.248000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.248000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.248000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.248000 audit[2781]: AVC avc: denied { confidentiality } for pid=2781 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:11:35.248000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcbe5b3f00 a2=94 a3=88 items=0 ppid=2650 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.248000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 01:11:35.252000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit: BPF prog-id=86 op=LOAD May 17 01:11:35.252000 audit[2784]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc95a11000 a2=98 a3=1999999999999999 items=0 ppid=2650 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.252000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 01:11:35.252000 audit: BPF prog-id=86 op=UNLOAD May 17 01:11:35.252000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit: BPF prog-id=87 op=LOAD May 17 01:11:35.252000 audit[2784]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc95a10ee0 a2=94 a3=ffff items=0 ppid=2650 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.252000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 01:11:35.252000 audit: BPF prog-id=87 op=UNLOAD May 17 01:11:35.252000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.252000 audit: BPF prog-id=88 op=LOAD May 17 01:11:35.252000 audit[2784]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc95a10f20 a2=94 a3=7ffc95a11100 items=0 ppid=2650 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.252000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 01:11:35.252000 audit: BPF prog-id=88 op=UNLOAD May 17 01:11:35.324150 systemd-networkd[1311]: vxlan.calico: Link UP May 17 01:11:35.324161 systemd-networkd[1311]: vxlan.calico: Gained carrier May 17 01:11:35.347000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.347000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.347000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.347000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.347000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.347000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.347000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.347000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.347000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.347000 audit: BPF prog-id=89 op=LOAD May 17 01:11:35.347000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdf58af6d0 a2=98 a3=0 items=0 ppid=2650 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.347000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:11:35.348000 audit: BPF prog-id=89 op=UNLOAD May 17 01:11:35.348000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit: BPF prog-id=90 op=LOAD May 17 01:11:35.348000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdf58af4e0 a2=94 a3=54428f items=0 ppid=2650 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:11:35.348000 audit: BPF prog-id=90 op=UNLOAD May 17 01:11:35.348000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit: BPF prog-id=91 op=LOAD May 17 01:11:35.348000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdf58af510 a2=94 a3=2 items=0 ppid=2650 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:11:35.348000 audit: BPF prog-id=91 op=UNLOAD May 17 01:11:35.348000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdf58af3e0 a2=28 a3=0 items=0 ppid=2650 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf58af410 a2=28 a3=0 items=0 ppid=2650 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf58af320 a2=28 a3=0 items=0 ppid=2650 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdf58af430 a2=28 a3=0 items=0 ppid=2650 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdf58af410 a2=28 a3=0 items=0 ppid=2650 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdf58af400 a2=28 a3=0 items=0 ppid=2650 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdf58af430 a2=28 a3=0 items=0 ppid=2650 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf58af410 a2=28 a3=0 items=0 ppid=2650 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf58af430 a2=28 a3=0 items=0 ppid=2650 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdf58af400 a2=28 a3=0 items=0 ppid=2650 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdf58af470 a2=28 a3=0 items=0 ppid=2650 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.348000 audit: BPF prog-id=92 op=LOAD May 17 01:11:35.348000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdf58af2e0 a2=94 a3=0 items=0 ppid=2650 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:11:35.348000 audit: BPF prog-id=92 op=UNLOAD May 17 01:11:35.349000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.349000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffdf58af2d0 a2=50 a3=2800 items=0 ppid=2650 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.349000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:11:35.349000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.349000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffdf58af2d0 a2=50 a3=2800 items=0 ppid=2650 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.349000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:11:35.349000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.349000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.349000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.349000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.349000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.349000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.349000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.349000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.349000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.349000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.349000 audit: BPF prog-id=93 op=LOAD May 17 01:11:35.349000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdf58aeaf0 a2=94 a3=2 items=0 ppid=2650 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.349000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:11:35.349000 audit: BPF prog-id=93 op=UNLOAD May 17 01:11:35.349000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.349000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.349000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.349000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.349000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.349000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.349000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.349000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.349000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.349000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.349000 audit: BPF prog-id=94 op=LOAD May 17 01:11:35.349000 audit[2810]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdf58aebf0 a2=94 a3=30 items=0 ppid=2650 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.349000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 01:11:35.351000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.351000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.351000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.351000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.351000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.351000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.351000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.351000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.351000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.351000 audit: BPF prog-id=95 op=LOAD May 17 01:11:35.351000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe32867a00 a2=98 a3=0 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.351000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.352000 audit: BPF prog-id=95 op=UNLOAD May 17 01:11:35.352000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.352000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.352000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.352000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.352000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.352000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.352000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.352000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.352000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.352000 audit: BPF prog-id=96 op=LOAD May 17 01:11:35.352000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe328677f0 a2=94 a3=54428f items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.352000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.352000 audit: BPF prog-id=96 op=UNLOAD May 17 01:11:35.352000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.352000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.352000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.352000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.352000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.352000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.352000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.352000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.352000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.352000 audit: BPF prog-id=97 op=LOAD May 17 01:11:35.352000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe32867820 a2=94 a3=2 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.352000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.352000 audit: BPF prog-id=97 op=UNLOAD May 17 01:11:35.422568 kubelet[1906]: E0517 01:11:35.422518 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:35.465000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.465000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.465000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.465000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.465000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.465000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.465000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.465000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.465000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.465000 audit: BPF prog-id=98 op=LOAD May 17 01:11:35.465000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe328676e0 a2=94 a3=1 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.465000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.465000 audit: BPF prog-id=98 op=UNLOAD May 17 01:11:35.465000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.465000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe328677b0 a2=50 a3=7ffe32867890 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.465000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.472000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.472000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe328676f0 a2=28 a3=0 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.472000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.472000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.472000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe32867720 a2=28 a3=0 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.472000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.472000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.472000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe32867630 a2=28 a3=0 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.472000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.472000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.472000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe32867740 a2=28 a3=0 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.472000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.472000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.472000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe32867720 a2=28 a3=0 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.472000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.472000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.472000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe32867710 a2=28 a3=0 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.472000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.472000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.472000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe32867740 a2=28 a3=0 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.472000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.472000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.472000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe32867720 a2=28 a3=0 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.472000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.472000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.472000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe32867740 a2=28 a3=0 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.472000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.472000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.472000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe32867710 a2=28 a3=0 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.472000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.472000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.472000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe32867780 a2=28 a3=0 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.472000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.472000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.472000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe32867530 a2=50 a3=1 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.472000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.472000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.472000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.472000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.472000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.472000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.472000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.472000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.472000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.472000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.472000 audit: BPF prog-id=99 op=LOAD May 17 01:11:35.472000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe32867530 a2=94 a3=5 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.472000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.473000 audit: BPF prog-id=99 op=UNLOAD May 17 01:11:35.473000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe328675e0 a2=50 a3=1 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.473000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe32867700 a2=4 a3=38 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.473000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { confidentiality } for pid=2814 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:11:35.473000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe32867750 a2=94 a3=6 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.473000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { confidentiality } for pid=2814 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:11:35.473000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe32866f00 a2=94 a3=88 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.473000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { confidentiality } for pid=2814 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:11:35.473000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe32866f00 a2=94 a3=88 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.473000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe32868930 a2=10 a3=f8f00800 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.473000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe328687d0 a2=10 a3=3 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.473000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe32868770 a2=10 a3=3 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.473000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.473000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:35.473000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe32868770 a2=10 a3=7 items=0 ppid=2650 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.473000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 01:11:35.483000 audit: BPF prog-id=94 op=UNLOAD May 17 01:11:35.515000 audit[2870]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2870 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 01:11:35.515000 audit[2870]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff279aeb00 a2=0 a3=7fff279aeaec items=0 ppid=2650 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.515000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 01:11:35.518000 audit[2869]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2869 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 01:11:35.518000 audit[2869]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffdfebb4ad0 a2=0 a3=7ffdfebb4abc items=0 ppid=2650 pid=2869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.518000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 01:11:35.519000 audit[2873]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2873 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 01:11:35.519000 audit[2873]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffd73637bf0 a2=0 a3=7ffd73637bdc items=0 ppid=2650 pid=2873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.519000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 01:11:35.521000 audit[2868]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2868 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 01:11:35.521000 audit[2868]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd98fcf6d0 a2=0 a3=7ffd98fcf6bc items=0 ppid=2650 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:35.521000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 01:11:36.408184 kubelet[1906]: E0517 01:11:36.408107 1906 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:36.422804 kubelet[1906]: E0517 01:11:36.422688 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:36.815853 systemd-networkd[1311]: vxlan.calico: Gained IPv6LL May 17 01:11:37.423830 kubelet[1906]: E0517 01:11:37.423749 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:38.423986 kubelet[1906]: E0517 01:11:38.423901 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:39.425043 kubelet[1906]: E0517 01:11:39.424925 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:39.574327 env[1553]: time="2025-05-17T01:11:39.574169319Z" level=info msg="StopPodSandbox for \"02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697\"" May 17 01:11:39.635779 env[1553]: 2025-05-17 01:11:39.604 [INFO][2892] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697" May 17 01:11:39.635779 env[1553]: 2025-05-17 01:11:39.604 [INFO][2892] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697" iface="eth0" netns="/var/run/netns/cni-c3434fb6-849d-7afb-6b92-8e14b68b47de" May 17 01:11:39.635779 env[1553]: 2025-05-17 01:11:39.604 [INFO][2892] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697" iface="eth0" netns="/var/run/netns/cni-c3434fb6-849d-7afb-6b92-8e14b68b47de" May 17 01:11:39.635779 env[1553]: 2025-05-17 01:11:39.604 [INFO][2892] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697" iface="eth0" netns="/var/run/netns/cni-c3434fb6-849d-7afb-6b92-8e14b68b47de" May 17 01:11:39.635779 env[1553]: 2025-05-17 01:11:39.604 [INFO][2892] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697" May 17 01:11:39.635779 env[1553]: 2025-05-17 01:11:39.604 [INFO][2892] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697" May 17 01:11:39.635779 env[1553]: 2025-05-17 01:11:39.618 [INFO][2909] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697" HandleID="k8s-pod-network.02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697" Workload="10.67.80.37-k8s-nginx--deployment--7fcdb87857--zkhdf-eth0" May 17 01:11:39.635779 env[1553]: 2025-05-17 01:11:39.619 [INFO][2909] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:11:39.635779 env[1553]: 2025-05-17 01:11:39.619 [INFO][2909] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:11:39.635779 env[1553]: 2025-05-17 01:11:39.628 [WARNING][2909] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697" HandleID="k8s-pod-network.02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697" Workload="10.67.80.37-k8s-nginx--deployment--7fcdb87857--zkhdf-eth0" May 17 01:11:39.635779 env[1553]: 2025-05-17 01:11:39.629 [INFO][2909] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697" HandleID="k8s-pod-network.02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697" Workload="10.67.80.37-k8s-nginx--deployment--7fcdb87857--zkhdf-eth0" May 17 01:11:39.635779 env[1553]: 2025-05-17 01:11:39.630 [INFO][2909] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:11:39.635779 env[1553]: 2025-05-17 01:11:39.634 [INFO][2892] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697" May 17 01:11:39.636660 env[1553]: time="2025-05-17T01:11:39.635915334Z" level=info msg="TearDown network for sandbox \"02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697\" successfully" May 17 01:11:39.636660 env[1553]: time="2025-05-17T01:11:39.635953402Z" level=info msg="StopPodSandbox for \"02fca6dcf2e1da54a44398a952f0e55fa8f8e92b17d9967513136855b1f43697\" returns successfully" May 17 01:11:39.636660 env[1553]: time="2025-05-17T01:11:39.636556152Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-zkhdf,Uid:e42cf67d-88c7-44e5-ae6b-336c0d7ac653,Namespace:default,Attempt:1,}" May 17 01:11:39.638736 systemd[1]: run-netns-cni\x2dc3434fb6\x2d849d\x2d7afb\x2d6b92\x2d8e14b68b47de.mount: Deactivated successfully. May 17 01:11:39.779488 systemd-networkd[1311]: cali9c739036f4e: Link UP May 17 01:11:39.837027 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 01:11:39.837068 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9c739036f4e: link becomes ready May 17 01:11:39.836993 systemd-networkd[1311]: cali9c739036f4e: Gained carrier May 17 01:11:39.849480 env[1553]: 2025-05-17 01:11:39.674 [INFO][2925] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.37-k8s-nginx--deployment--7fcdb87857--zkhdf-eth0 nginx-deployment-7fcdb87857- default e42cf67d-88c7-44e5-ae6b-336c0d7ac653 1990 0 2025-05-17 01:11:28 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.37 nginx-deployment-7fcdb87857-zkhdf eth0 default [] [] [kns.default ksa.default.default] cali9c739036f4e [] [] }} ContainerID="ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd" Namespace="default" Pod="nginx-deployment-7fcdb87857-zkhdf" WorkloadEndpoint="10.67.80.37-k8s-nginx--deployment--7fcdb87857--zkhdf-" May 17 01:11:39.849480 env[1553]: 2025-05-17 01:11:39.674 [INFO][2925] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd" Namespace="default" Pod="nginx-deployment-7fcdb87857-zkhdf" WorkloadEndpoint="10.67.80.37-k8s-nginx--deployment--7fcdb87857--zkhdf-eth0" May 17 01:11:39.849480 env[1553]: 2025-05-17 01:11:39.728 [INFO][2946] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd" HandleID="k8s-pod-network.ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd" Workload="10.67.80.37-k8s-nginx--deployment--7fcdb87857--zkhdf-eth0" May 17 01:11:39.849480 env[1553]: 2025-05-17 01:11:39.728 [INFO][2946] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd" HandleID="k8s-pod-network.ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd" Workload="10.67.80.37-k8s-nginx--deployment--7fcdb87857--zkhdf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003855f0), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.37", "pod":"nginx-deployment-7fcdb87857-zkhdf", "timestamp":"2025-05-17 01:11:39.72844161 +0000 UTC"}, Hostname:"10.67.80.37", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 01:11:39.849480 env[1553]: 2025-05-17 01:11:39.728 [INFO][2946] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:11:39.849480 env[1553]: 2025-05-17 01:11:39.728 [INFO][2946] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:11:39.849480 env[1553]: 2025-05-17 01:11:39.728 [INFO][2946] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.37' May 17 01:11:39.849480 env[1553]: 2025-05-17 01:11:39.739 [INFO][2946] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd" host="10.67.80.37" May 17 01:11:39.849480 env[1553]: 2025-05-17 01:11:39.745 [INFO][2946] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.80.37" May 17 01:11:39.849480 env[1553]: 2025-05-17 01:11:39.751 [INFO][2946] ipam/ipam.go 511: Trying affinity for 192.168.81.0/26 host="10.67.80.37" May 17 01:11:39.849480 env[1553]: 2025-05-17 01:11:39.753 [INFO][2946] ipam/ipam.go 158: Attempting to load block cidr=192.168.81.0/26 host="10.67.80.37" May 17 01:11:39.849480 env[1553]: 2025-05-17 01:11:39.757 [INFO][2946] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.81.0/26 host="10.67.80.37" May 17 01:11:39.849480 env[1553]: 2025-05-17 01:11:39.757 [INFO][2946] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.81.0/26 handle="k8s-pod-network.ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd" host="10.67.80.37" May 17 01:11:39.849480 env[1553]: 2025-05-17 01:11:39.759 [INFO][2946] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd May 17 01:11:39.849480 env[1553]: 2025-05-17 01:11:39.764 [INFO][2946] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.81.0/26 handle="k8s-pod-network.ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd" host="10.67.80.37" May 17 01:11:39.849480 env[1553]: 2025-05-17 01:11:39.770 [INFO][2946] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.81.1/26] block=192.168.81.0/26 handle="k8s-pod-network.ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd" host="10.67.80.37" May 17 01:11:39.849480 env[1553]: 2025-05-17 01:11:39.771 [INFO][2946] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.81.1/26] handle="k8s-pod-network.ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd" host="10.67.80.37" May 17 01:11:39.849480 env[1553]: 2025-05-17 01:11:39.771 [INFO][2946] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:11:39.849480 env[1553]: 2025-05-17 01:11:39.771 [INFO][2946] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.81.1/26] IPv6=[] ContainerID="ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd" HandleID="k8s-pod-network.ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd" Workload="10.67.80.37-k8s-nginx--deployment--7fcdb87857--zkhdf-eth0" May 17 01:11:39.849973 env[1553]: 2025-05-17 01:11:39.776 [INFO][2925] cni-plugin/k8s.go 418: Populated endpoint ContainerID="ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd" Namespace="default" Pod="nginx-deployment-7fcdb87857-zkhdf" WorkloadEndpoint="10.67.80.37-k8s-nginx--deployment--7fcdb87857--zkhdf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.37-k8s-nginx--deployment--7fcdb87857--zkhdf-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"e42cf67d-88c7-44e5-ae6b-336c0d7ac653", ResourceVersion:"1990", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 11, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.37", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-zkhdf", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.81.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9c739036f4e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:11:39.849973 env[1553]: 2025-05-17 01:11:39.776 [INFO][2925] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.81.1/32] ContainerID="ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd" Namespace="default" Pod="nginx-deployment-7fcdb87857-zkhdf" WorkloadEndpoint="10.67.80.37-k8s-nginx--deployment--7fcdb87857--zkhdf-eth0" May 17 01:11:39.849973 env[1553]: 2025-05-17 01:11:39.776 [INFO][2925] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9c739036f4e ContainerID="ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd" Namespace="default" Pod="nginx-deployment-7fcdb87857-zkhdf" WorkloadEndpoint="10.67.80.37-k8s-nginx--deployment--7fcdb87857--zkhdf-eth0" May 17 01:11:39.849973 env[1553]: 2025-05-17 01:11:39.837 [INFO][2925] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd" Namespace="default" Pod="nginx-deployment-7fcdb87857-zkhdf" WorkloadEndpoint="10.67.80.37-k8s-nginx--deployment--7fcdb87857--zkhdf-eth0" May 17 01:11:39.849973 env[1553]: 2025-05-17 01:11:39.837 [INFO][2925] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd" Namespace="default" Pod="nginx-deployment-7fcdb87857-zkhdf" WorkloadEndpoint="10.67.80.37-k8s-nginx--deployment--7fcdb87857--zkhdf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.37-k8s-nginx--deployment--7fcdb87857--zkhdf-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"e42cf67d-88c7-44e5-ae6b-336c0d7ac653", ResourceVersion:"1990", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 11, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.37", ContainerID:"ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd", Pod:"nginx-deployment-7fcdb87857-zkhdf", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.81.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9c739036f4e", MAC:"de:84:af:82:ac:ef", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:11:39.849973 env[1553]: 2025-05-17 01:11:39.848 [INFO][2925] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd" Namespace="default" Pod="nginx-deployment-7fcdb87857-zkhdf" WorkloadEndpoint="10.67.80.37-k8s-nginx--deployment--7fcdb87857--zkhdf-eth0" May 17 01:11:39.861235 env[1553]: time="2025-05-17T01:11:39.861204135Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 01:11:39.861235 env[1553]: time="2025-05-17T01:11:39.861226470Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 01:11:39.861235 env[1553]: time="2025-05-17T01:11:39.861235952Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 01:11:39.861401 env[1553]: time="2025-05-17T01:11:39.861298891Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd pid=2981 runtime=io.containerd.runc.v2 May 17 01:11:39.867859 systemd[1]: Started cri-containerd-ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd.scope. May 17 01:11:39.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:39.899822 kernel: kauditd_printk_skb: 548 callbacks suppressed May 17 01:11:39.899861 kernel: audit: type=1400 audit(1747444299.872:624): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:39.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.023918 kernel: audit: type=1400 audit(1747444299.872:625): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.023953 kernel: audit: type=1400 audit(1747444299.872:626): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:39.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.086112 kernel: audit: type=1400 audit(1747444299.872:627): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:39.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.148688 kernel: audit: type=1400 audit(1747444299.872:628): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:39.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.211291 kernel: audit: type=1400 audit(1747444299.872:629): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:39.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.273882 kernel: audit: type=1400 audit(1747444299.872:630): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:39.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.336376 kernel: audit: type=1400 audit(1747444299.872:631): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:39.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:39.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.399307 kernel: audit: type=1400 audit(1747444299.872:632): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.425587 kubelet[1906]: E0517 01:11:40.425506 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:39.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.523371 kernel: audit: type=1400 audit(1747444299.960:633): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:39.960000 audit: BPF prog-id=100 op=LOAD May 17 01:11:39.960000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:39.960000 audit[2990]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2981 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:39.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313366303833666266386637633563353031373535376139613930 May 17 01:11:39.960000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:39.960000 audit[2990]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2981 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:39.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313366303833666266386637633563353031373535376139613930 May 17 01:11:39.960000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:39.960000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:39.960000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:39.960000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:39.960000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:39.960000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:39.960000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:39.960000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:39.960000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:39.960000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:39.960000 audit: BPF prog-id=101 op=LOAD May 17 01:11:39.960000 audit[2990]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000306df0 items=0 ppid=2981 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:39.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313366303833666266386637633563353031373535376139613930 May 17 01:11:40.084000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.084000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.084000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.084000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.084000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.084000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.084000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.084000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.084000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.084000 audit: BPF prog-id=102 op=LOAD May 17 01:11:40.084000 audit[2990]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000306e38 items=0 ppid=2981 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:40.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313366303833666266386637633563353031373535376139613930 May 17 01:11:40.209000 audit: BPF prog-id=102 op=UNLOAD May 17 01:11:40.209000 audit: BPF prog-id=101 op=UNLOAD May 17 01:11:40.209000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.209000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.209000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.209000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.209000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.209000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.209000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.209000 audit[2990]: AVC avc: denied { perfmon } for pid=2990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.209000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.209000 audit[2990]: AVC avc: denied { bpf } for pid=2990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:40.209000 audit: BPF prog-id=103 op=LOAD May 17 01:11:40.209000 audit[2990]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000307248 items=0 ppid=2981 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:40.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313366303833666266386637633563353031373535376139613930 May 17 01:11:39.858000 audit[2972]: NETFILTER_CFG table=filter:69 family=2 entries=38 op=nft_register_chain pid=2972 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 01:11:39.858000 audit[2972]: SYSCALL arch=c000003e syscall=46 success=yes exit=21324 a0=3 a1=7ffe36546e40 a2=0 a3=7ffe36546e2c items=0 ppid=2650 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:39.858000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 01:11:40.539224 env[1553]: time="2025-05-17T01:11:40.539192223Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-zkhdf,Uid:e42cf67d-88c7-44e5-ae6b-336c0d7ac653,Namespace:default,Attempt:1,} returns sandbox id \"ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd\"" May 17 01:11:40.539807 env[1553]: time="2025-05-17T01:11:40.539761350Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 17 01:11:41.039641 systemd-networkd[1311]: cali9c739036f4e: Gained IPv6LL May 17 01:11:41.425811 kubelet[1906]: E0517 01:11:41.425692 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:41.891657 update_engine[1549]: I0517 01:11:41.891443 1549 update_attempter.cc:509] Updating boot flags... May 17 01:11:41.958677 kubelet[1906]: I0517 01:11:41.958630 1906 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 01:11:42.426217 kubelet[1906]: E0517 01:11:42.426177 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:42.750421 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount241887202.mount: Deactivated successfully. May 17 01:11:43.426577 kubelet[1906]: E0517 01:11:43.426486 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:43.572864 env[1553]: time="2025-05-17T01:11:43.572802557Z" level=info msg="StopPodSandbox for \"f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d\"" May 17 01:11:43.634808 env[1553]: 2025-05-17 01:11:43.612 [INFO][3116] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d" May 17 01:11:43.634808 env[1553]: 2025-05-17 01:11:43.613 [INFO][3116] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d" iface="eth0" netns="/var/run/netns/cni-f2776b93-e271-10cf-a875-760976d378c3" May 17 01:11:43.634808 env[1553]: 2025-05-17 01:11:43.613 [INFO][3116] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d" iface="eth0" netns="/var/run/netns/cni-f2776b93-e271-10cf-a875-760976d378c3" May 17 01:11:43.634808 env[1553]: 2025-05-17 01:11:43.613 [INFO][3116] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d" iface="eth0" netns="/var/run/netns/cni-f2776b93-e271-10cf-a875-760976d378c3" May 17 01:11:43.634808 env[1553]: 2025-05-17 01:11:43.613 [INFO][3116] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d" May 17 01:11:43.634808 env[1553]: 2025-05-17 01:11:43.613 [INFO][3116] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d" May 17 01:11:43.634808 env[1553]: 2025-05-17 01:11:43.624 [INFO][3132] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d" HandleID="k8s-pod-network.f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d" Workload="10.67.80.37-k8s-csi--node--driver--gpw96-eth0" May 17 01:11:43.634808 env[1553]: 2025-05-17 01:11:43.627 [INFO][3132] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:11:43.634808 env[1553]: 2025-05-17 01:11:43.627 [INFO][3132] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:11:43.634808 env[1553]: 2025-05-17 01:11:43.631 [WARNING][3132] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d" HandleID="k8s-pod-network.f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d" Workload="10.67.80.37-k8s-csi--node--driver--gpw96-eth0" May 17 01:11:43.634808 env[1553]: 2025-05-17 01:11:43.631 [INFO][3132] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d" HandleID="k8s-pod-network.f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d" Workload="10.67.80.37-k8s-csi--node--driver--gpw96-eth0" May 17 01:11:43.634808 env[1553]: 2025-05-17 01:11:43.633 [INFO][3132] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:11:43.634808 env[1553]: 2025-05-17 01:11:43.633 [INFO][3116] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d" May 17 01:11:43.635196 env[1553]: time="2025-05-17T01:11:43.634927070Z" level=info msg="TearDown network for sandbox \"f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d\" successfully" May 17 01:11:43.635196 env[1553]: time="2025-05-17T01:11:43.634949313Z" level=info msg="StopPodSandbox for \"f5d901ec60b9cdf4dcd3887d26931b8a422669badaa6aacfd8afa5f18127233d\" returns successfully" May 17 01:11:43.635511 env[1553]: time="2025-05-17T01:11:43.635474364Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gpw96,Uid:5628b461-13a4-4f69-b35b-e90e955ae865,Namespace:calico-system,Attempt:1,}" May 17 01:11:43.636170 systemd[1]: run-netns-cni\x2df2776b93\x2de271\x2d10cf\x2da875\x2d760976d378c3.mount: Deactivated successfully. May 17 01:11:43.644585 env[1553]: time="2025-05-17T01:11:43.644567988Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:43.645110 env[1553]: time="2025-05-17T01:11:43.645097825Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:43.647126 env[1553]: time="2025-05-17T01:11:43.647110217Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:43.648152 env[1553]: time="2025-05-17T01:11:43.648133743Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:43.648753 env[1553]: time="2025-05-17T01:11:43.648709050Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 17 01:11:43.650474 env[1553]: time="2025-05-17T01:11:43.650434709Z" level=info msg="CreateContainer within sandbox \"ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 17 01:11:43.655096 env[1553]: time="2025-05-17T01:11:43.655073128Z" level=info msg="CreateContainer within sandbox \"ab13f083fbf8f7c5c5017557a9a901b5bea7a90168c9a3e2c9c98504a7eee8fd\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"815539627dae5611b7659f2062e16e83470aaf5f9854ff7ef868b78aec023452\"" May 17 01:11:43.655366 env[1553]: time="2025-05-17T01:11:43.655349363Z" level=info msg="StartContainer for \"815539627dae5611b7659f2062e16e83470aaf5f9854ff7ef868b78aec023452\"" May 17 01:11:43.662952 systemd[1]: Started cri-containerd-815539627dae5611b7659f2062e16e83470aaf5f9854ff7ef868b78aec023452.scope. May 17 01:11:43.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit: BPF prog-id=104 op=LOAD May 17 01:11:43.668000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2981 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:43.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831353533393632376461653536313162373635396632303632653136 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2981 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:43.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831353533393632376461653536313162373635396632303632653136 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit: BPF prog-id=105 op=LOAD May 17 01:11:43.668000 audit[3175]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000273dc0 items=0 ppid=2981 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:43.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831353533393632376461653536313162373635396632303632653136 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit: BPF prog-id=106 op=LOAD May 17 01:11:43.668000 audit[3175]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000273e08 items=0 ppid=2981 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:43.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831353533393632376461653536313162373635396632303632653136 May 17 01:11:43.668000 audit: BPF prog-id=106 op=UNLOAD May 17 01:11:43.668000 audit: BPF prog-id=105 op=UNLOAD May 17 01:11:43.668000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.668000 audit: BPF prog-id=107 op=LOAD May 17 01:11:43.668000 audit[3175]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d2218 items=0 ppid=2981 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:43.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831353533393632376461653536313162373635396632303632653136 May 17 01:11:43.675087 env[1553]: time="2025-05-17T01:11:43.675062664Z" level=info msg="StartContainer for \"815539627dae5611b7659f2062e16e83470aaf5f9854ff7ef868b78aec023452\" returns successfully" May 17 01:11:43.771163 systemd-networkd[1311]: calid2f4a21a4aa: Link UP May 17 01:11:43.839165 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 01:11:43.839211 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid2f4a21a4aa: link becomes ready May 17 01:11:43.839209 systemd-networkd[1311]: calid2f4a21a4aa: Gained carrier May 17 01:11:43.856932 env[1553]: 2025-05-17 01:11:43.672 [INFO][3149] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.37-k8s-csi--node--driver--gpw96-eth0 csi-node-driver- calico-system 5628b461-13a4-4f69-b35b-e90e955ae865 2004 0 2025-05-17 01:11:16 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:78f6f74485 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.67.80.37 csi-node-driver-gpw96 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calid2f4a21a4aa [] [] }} ContainerID="aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71" Namespace="calico-system" Pod="csi-node-driver-gpw96" WorkloadEndpoint="10.67.80.37-k8s-csi--node--driver--gpw96-" May 17 01:11:43.856932 env[1553]: 2025-05-17 01:11:43.672 [INFO][3149] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71" Namespace="calico-system" Pod="csi-node-driver-gpw96" WorkloadEndpoint="10.67.80.37-k8s-csi--node--driver--gpw96-eth0" May 17 01:11:43.856932 env[1553]: 2025-05-17 01:11:43.689 [INFO][3212] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71" HandleID="k8s-pod-network.aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71" Workload="10.67.80.37-k8s-csi--node--driver--gpw96-eth0" May 17 01:11:43.856932 env[1553]: 2025-05-17 01:11:43.689 [INFO][3212] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71" HandleID="k8s-pod-network.aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71" Workload="10.67.80.37-k8s-csi--node--driver--gpw96-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004e540), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.80.37", "pod":"csi-node-driver-gpw96", "timestamp":"2025-05-17 01:11:43.689103462 +0000 UTC"}, Hostname:"10.67.80.37", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 01:11:43.856932 env[1553]: 2025-05-17 01:11:43.689 [INFO][3212] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:11:43.856932 env[1553]: 2025-05-17 01:11:43.689 [INFO][3212] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:11:43.856932 env[1553]: 2025-05-17 01:11:43.689 [INFO][3212] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.37' May 17 01:11:43.856932 env[1553]: 2025-05-17 01:11:43.704 [INFO][3212] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71" host="10.67.80.37" May 17 01:11:43.856932 env[1553]: 2025-05-17 01:11:43.719 [INFO][3212] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.80.37" May 17 01:11:43.856932 env[1553]: 2025-05-17 01:11:43.731 [INFO][3212] ipam/ipam.go 511: Trying affinity for 192.168.81.0/26 host="10.67.80.37" May 17 01:11:43.856932 env[1553]: 2025-05-17 01:11:43.735 [INFO][3212] ipam/ipam.go 158: Attempting to load block cidr=192.168.81.0/26 host="10.67.80.37" May 17 01:11:43.856932 env[1553]: 2025-05-17 01:11:43.740 [INFO][3212] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.81.0/26 host="10.67.80.37" May 17 01:11:43.856932 env[1553]: 2025-05-17 01:11:43.740 [INFO][3212] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.81.0/26 handle="k8s-pod-network.aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71" host="10.67.80.37" May 17 01:11:43.856932 env[1553]: 2025-05-17 01:11:43.744 [INFO][3212] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71 May 17 01:11:43.856932 env[1553]: 2025-05-17 01:11:43.752 [INFO][3212] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.81.0/26 handle="k8s-pod-network.aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71" host="10.67.80.37" May 17 01:11:43.856932 env[1553]: 2025-05-17 01:11:43.763 [INFO][3212] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.81.2/26] block=192.168.81.0/26 handle="k8s-pod-network.aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71" host="10.67.80.37" May 17 01:11:43.856932 env[1553]: 2025-05-17 01:11:43.763 [INFO][3212] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.81.2/26] handle="k8s-pod-network.aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71" host="10.67.80.37" May 17 01:11:43.856932 env[1553]: 2025-05-17 01:11:43.763 [INFO][3212] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:11:43.856932 env[1553]: 2025-05-17 01:11:43.763 [INFO][3212] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.81.2/26] IPv6=[] ContainerID="aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71" HandleID="k8s-pod-network.aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71" Workload="10.67.80.37-k8s-csi--node--driver--gpw96-eth0" May 17 01:11:43.857433 env[1553]: 2025-05-17 01:11:43.767 [INFO][3149] cni-plugin/k8s.go 418: Populated endpoint ContainerID="aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71" Namespace="calico-system" Pod="csi-node-driver-gpw96" WorkloadEndpoint="10.67.80.37-k8s-csi--node--driver--gpw96-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.37-k8s-csi--node--driver--gpw96-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5628b461-13a4-4f69-b35b-e90e955ae865", ResourceVersion:"2004", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 11, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.37", ContainerID:"", Pod:"csi-node-driver-gpw96", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.81.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid2f4a21a4aa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:11:43.857433 env[1553]: 2025-05-17 01:11:43.768 [INFO][3149] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.81.2/32] ContainerID="aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71" Namespace="calico-system" Pod="csi-node-driver-gpw96" WorkloadEndpoint="10.67.80.37-k8s-csi--node--driver--gpw96-eth0" May 17 01:11:43.857433 env[1553]: 2025-05-17 01:11:43.768 [INFO][3149] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid2f4a21a4aa ContainerID="aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71" Namespace="calico-system" Pod="csi-node-driver-gpw96" WorkloadEndpoint="10.67.80.37-k8s-csi--node--driver--gpw96-eth0" May 17 01:11:43.857433 env[1553]: 2025-05-17 01:11:43.839 [INFO][3149] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71" Namespace="calico-system" Pod="csi-node-driver-gpw96" WorkloadEndpoint="10.67.80.37-k8s-csi--node--driver--gpw96-eth0" May 17 01:11:43.857433 env[1553]: 2025-05-17 01:11:43.839 [INFO][3149] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71" Namespace="calico-system" Pod="csi-node-driver-gpw96" WorkloadEndpoint="10.67.80.37-k8s-csi--node--driver--gpw96-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.37-k8s-csi--node--driver--gpw96-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5628b461-13a4-4f69-b35b-e90e955ae865", ResourceVersion:"2004", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 11, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.37", ContainerID:"aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71", Pod:"csi-node-driver-gpw96", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.81.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid2f4a21a4aa", MAC:"8e:54:de:bf:63:75", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:11:43.857433 env[1553]: 2025-05-17 01:11:43.856 [INFO][3149] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71" Namespace="calico-system" Pod="csi-node-driver-gpw96" WorkloadEndpoint="10.67.80.37-k8s-csi--node--driver--gpw96-eth0" May 17 01:11:43.862275 env[1553]: time="2025-05-17T01:11:43.862241798Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 01:11:43.862275 env[1553]: time="2025-05-17T01:11:43.862263158Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 01:11:43.862275 env[1553]: time="2025-05-17T01:11:43.862270283Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 01:11:43.862420 env[1553]: time="2025-05-17T01:11:43.862337267Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71 pid=3271 runtime=io.containerd.runc.v2 May 17 01:11:43.862000 audit[3276]: NETFILTER_CFG table=filter:70 family=2 entries=42 op=nft_register_chain pid=3276 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 01:11:43.862000 audit[3276]: SYSCALL arch=c000003e syscall=46 success=yes exit=22552 a0=3 a1=7fffba6c3130 a2=0 a3=7fffba6c311c items=0 ppid=2650 pid=3276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:43.862000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 01:11:43.867575 systemd[1]: Started cri-containerd-aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71.scope. May 17 01:11:43.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit: BPF prog-id=108 op=LOAD May 17 01:11:43.872000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3271 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:43.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161356239633534336232626231656430663430363864636538386534 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3271 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:43.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161356239633534336232626231656430663430363864636538386534 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit: BPF prog-id=109 op=LOAD May 17 01:11:43.872000 audit[3281]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002c7dc0 items=0 ppid=3271 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:43.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161356239633534336232626231656430663430363864636538386534 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit: BPF prog-id=110 op=LOAD May 17 01:11:43.872000 audit[3281]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002c7e08 items=0 ppid=3271 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:43.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161356239633534336232626231656430663430363864636538386534 May 17 01:11:43.872000 audit: BPF prog-id=110 op=UNLOAD May 17 01:11:43.872000 audit: BPF prog-id=109 op=UNLOAD May 17 01:11:43.872000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:43.872000 audit: BPF prog-id=111 op=LOAD May 17 01:11:43.872000 audit[3281]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000394218 items=0 ppid=3271 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:43.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161356239633534336232626231656430663430363864636538386534 May 17 01:11:43.878541 env[1553]: time="2025-05-17T01:11:43.878493564Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gpw96,Uid:5628b461-13a4-4f69-b35b-e90e955ae865,Namespace:calico-system,Attempt:1,} returns sandbox id \"aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71\"" May 17 01:11:43.879240 env[1553]: time="2025-05-17T01:11:43.879228090Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 01:11:44.426976 kubelet[1906]: E0517 01:11:44.426865 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:44.654227 kubelet[1906]: I0517 01:11:44.654171 1906 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-zkhdf" podStartSLOduration=13.544368838 podStartE2EDuration="16.654161541s" podCreationTimestamp="2025-05-17 01:11:28 +0000 UTC" firstStartedPulling="2025-05-17 01:11:40.539596498 +0000 UTC m=+24.566615168" lastFinishedPulling="2025-05-17 01:11:43.649389201 +0000 UTC m=+27.676407871" observedRunningTime="2025-05-17 01:11:44.654098225 +0000 UTC m=+28.681116901" watchObservedRunningTime="2025-05-17 01:11:44.654161541 +0000 UTC m=+28.681180211" May 17 01:11:45.366569 env[1553]: time="2025-05-17T01:11:45.366544594Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:45.367135 env[1553]: time="2025-05-17T01:11:45.367121812Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:45.367763 env[1553]: time="2025-05-17T01:11:45.367742190Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:45.368656 env[1553]: time="2025-05-17T01:11:45.368642929Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:45.368830 env[1553]: time="2025-05-17T01:11:45.368801264Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 01:11:45.370843 env[1553]: time="2025-05-17T01:11:45.370811416Z" level=info msg="CreateContainer within sandbox \"aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 01:11:45.376487 env[1553]: time="2025-05-17T01:11:45.376471340Z" level=info msg="CreateContainer within sandbox \"aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"c667d52b5fa4e3c7127407431e2e017a6623242abd2fa2f4db19ce17b08b3a5d\"" May 17 01:11:45.376866 env[1553]: time="2025-05-17T01:11:45.376821252Z" level=info msg="StartContainer for \"c667d52b5fa4e3c7127407431e2e017a6623242abd2fa2f4db19ce17b08b3a5d\"" May 17 01:11:45.386763 systemd[1]: Started cri-containerd-c667d52b5fa4e3c7127407431e2e017a6623242abd2fa2f4db19ce17b08b3a5d.scope. May 17 01:11:45.392000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.420091 kernel: kauditd_printk_skb: 167 callbacks suppressed May 17 01:11:45.420168 kernel: audit: type=1400 audit(1747444305.392:680): avc: denied { perfmon } for pid=3312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.427546 kubelet[1906]: E0517 01:11:45.427498 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:45.392000 audit[3312]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f440e1fecf8 items=0 ppid=3271 pid=3312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:45.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336363764353262356661346533633731323734303734333165326530 May 17 01:11:45.392000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.576235 kernel: audit: type=1300 audit(1747444305.392:680): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f440e1fecf8 items=0 ppid=3271 pid=3312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:45.576263 kernel: audit: type=1327 audit(1747444305.392:680): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336363764353262356661346533633731323734303734333165326530 May 17 01:11:45.576275 kernel: audit: type=1400 audit(1747444305.392:681): avc: denied { bpf } for pid=3312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.392000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.788045 kernel: audit: type=1400 audit(1747444305.392:681): avc: denied { bpf } for pid=3312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.788075 kernel: audit: type=1400 audit(1747444305.392:681): avc: denied { bpf } for pid=3312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.392000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.839439 systemd-networkd[1311]: calid2f4a21a4aa: Gained IPv6LL May 17 01:11:45.849129 kernel: audit: type=1400 audit(1747444305.392:681): avc: denied { perfmon } for pid=3312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.392000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.910553 kernel: audit: type=1400 audit(1747444305.392:681): avc: denied { perfmon } for pid=3312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.392000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.915870 env[1553]: time="2025-05-17T01:11:45.915844594Z" level=info msg="StartContainer for \"c667d52b5fa4e3c7127407431e2e017a6623242abd2fa2f4db19ce17b08b3a5d\" returns successfully" May 17 01:11:45.916575 env[1553]: time="2025-05-17T01:11:45.916528732Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 01:11:45.971984 kernel: audit: type=1400 audit(1747444305.392:681): avc: denied { perfmon } for pid=3312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.392000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:46.033475 kernel: audit: type=1400 audit(1747444305.392:681): avc: denied { perfmon } for pid=3312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.392000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.392000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.392000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.392000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.392000 audit: BPF prog-id=112 op=LOAD May 17 01:11:45.392000 audit[3312]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000096af8 items=0 ppid=3271 pid=3312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:45.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336363764353262356661346533633731323734303734333165326530 May 17 01:11:45.481000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.481000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.481000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.481000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.481000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.481000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.481000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.481000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.481000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.481000 audit: BPF prog-id=113 op=LOAD May 17 01:11:45.481000 audit[3312]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000096b48 items=0 ppid=3271 pid=3312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:45.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336363764353262356661346533633731323734303734333165326530 May 17 01:11:45.725000 audit: BPF prog-id=113 op=UNLOAD May 17 01:11:45.725000 audit: BPF prog-id=112 op=UNLOAD May 17 01:11:45.725000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.725000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.725000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.725000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.725000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.725000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.725000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.725000 audit[3312]: AVC avc: denied { perfmon } for pid=3312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.725000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.725000 audit[3312]: AVC avc: denied { bpf } for pid=3312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:45.725000 audit: BPF prog-id=114 op=LOAD May 17 01:11:45.725000 audit[3312]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000096bd8 items=0 ppid=3271 pid=3312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:45.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336363764353262356661346533633731323734303734333165326530 May 17 01:11:46.428716 kubelet[1906]: E0517 01:11:46.428650 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:47.429394 kubelet[1906]: E0517 01:11:47.429336 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:47.454141 env[1553]: time="2025-05-17T01:11:47.454098230Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:47.454721 env[1553]: time="2025-05-17T01:11:47.454675036Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:47.455422 env[1553]: time="2025-05-17T01:11:47.455378504Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:47.456172 env[1553]: time="2025-05-17T01:11:47.456124337Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:47.456447 env[1553]: time="2025-05-17T01:11:47.456412786Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 01:11:47.458582 env[1553]: time="2025-05-17T01:11:47.458540094Z" level=info msg="CreateContainer within sandbox \"aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 01:11:47.463786 env[1553]: time="2025-05-17T01:11:47.463739016Z" level=info msg="CreateContainer within sandbox \"aa5b9c543b2bb1ed0f4068dce88e48636d6bed84b226da0484c45a1e383eff71\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"0f7ae7a8ea5b742b4db503ef2a5fe03fb975e659a958109b5fe881abf02a9ebe\"" May 17 01:11:47.464156 env[1553]: time="2025-05-17T01:11:47.464143777Z" level=info msg="StartContainer for \"0f7ae7a8ea5b742b4db503ef2a5fe03fb975e659a958109b5fe881abf02a9ebe\"" May 17 01:11:47.474897 systemd[1]: Started cri-containerd-0f7ae7a8ea5b742b4db503ef2a5fe03fb975e659a958109b5fe881abf02a9ebe.scope. May 17 01:11:47.479000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.479000 audit[3354]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7ff874cd41c8 items=0 ppid=3271 pid=3354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:47.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066376165376138656135623734326234646235303365663261356665 May 17 01:11:47.479000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.479000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.479000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.479000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.479000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.479000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.479000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.479000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.479000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.479000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.479000 audit: BPF prog-id=115 op=LOAD May 17 01:11:47.479000 audit[3354]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000373f68 items=0 ppid=3271 pid=3354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:47.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066376165376138656135623734326234646235303365663261356665 May 17 01:11:47.479000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.479000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.479000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.479000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.479000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.479000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.479000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.479000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.479000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.479000 audit: BPF prog-id=116 op=LOAD May 17 01:11:47.479000 audit[3354]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000373fb8 items=0 ppid=3271 pid=3354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:47.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066376165376138656135623734326234646235303365663261356665 May 17 01:11:47.479000 audit: BPF prog-id=116 op=UNLOAD May 17 01:11:47.479000 audit: BPF prog-id=115 op=UNLOAD May 17 01:11:47.480000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.480000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.480000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.480000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.480000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.480000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.480000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.480000 audit[3354]: AVC avc: denied { perfmon } for pid=3354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.480000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.480000 audit[3354]: AVC avc: denied { bpf } for pid=3354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:47.480000 audit: BPF prog-id=117 op=LOAD May 17 01:11:47.480000 audit[3354]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003e2048 items=0 ppid=3271 pid=3354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:47.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066376165376138656135623734326234646235303365663261356665 May 17 01:11:47.486697 env[1553]: time="2025-05-17T01:11:47.486675266Z" level=info msg="StartContainer for \"0f7ae7a8ea5b742b4db503ef2a5fe03fb975e659a958109b5fe881abf02a9ebe\" returns successfully" May 17 01:11:47.506537 kubelet[1906]: I0517 01:11:47.506520 1906 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 01:11:47.506537 kubelet[1906]: I0517 01:11:47.506540 1906 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 01:11:47.684259 kubelet[1906]: I0517 01:11:47.683985 1906 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-gpw96" podStartSLOduration=28.105978596 podStartE2EDuration="31.683951296s" podCreationTimestamp="2025-05-17 01:11:16 +0000 UTC" firstStartedPulling="2025-05-17 01:11:43.879122665 +0000 UTC m=+27.906141334" lastFinishedPulling="2025-05-17 01:11:47.457095362 +0000 UTC m=+31.484114034" observedRunningTime="2025-05-17 01:11:47.683503039 +0000 UTC m=+31.710521785" watchObservedRunningTime="2025-05-17 01:11:47.683951296 +0000 UTC m=+31.710970019" May 17 01:11:48.429608 kubelet[1906]: E0517 01:11:48.429491 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:49.430283 kubelet[1906]: E0517 01:11:49.430205 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:50.430694 kubelet[1906]: E0517 01:11:50.430588 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:50.949000 audit[3392]: NETFILTER_CFG table=filter:71 family=2 entries=24 op=nft_register_rule pid=3392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:11:50.967942 systemd[1]: Created slice kubepods-besteffort-poded6851c9_7ea3_4ddf_b45e_58164a193db2.slice. May 17 01:11:50.976980 kernel: kauditd_printk_skb: 76 callbacks suppressed May 17 01:11:50.977037 kernel: audit: type=1325 audit(1747444310.949:692): table=filter:71 family=2 entries=24 op=nft_register_rule pid=3392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:11:50.949000 audit[3392]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7fff287fac50 a2=0 a3=7fff287fac3c items=0 ppid=2161 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:51.076625 kubelet[1906]: I0517 01:11:51.076577 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/ed6851c9-7ea3-4ddf-b45e-58164a193db2-data\") pod \"nfs-server-provisioner-0\" (UID: \"ed6851c9-7ea3-4ddf-b45e-58164a193db2\") " pod="default/nfs-server-provisioner-0" May 17 01:11:51.076625 kubelet[1906]: I0517 01:11:51.076612 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h9sbw\" (UniqueName: \"kubernetes.io/projected/ed6851c9-7ea3-4ddf-b45e-58164a193db2-kube-api-access-h9sbw\") pod \"nfs-server-provisioner-0\" (UID: \"ed6851c9-7ea3-4ddf-b45e-58164a193db2\") " pod="default/nfs-server-provisioner-0" May 17 01:11:51.132522 kernel: audit: type=1300 audit(1747444310.949:692): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7fff287fac50 a2=0 a3=7fff287fac3c items=0 ppid=2161 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:51.132552 kernel: audit: type=1327 audit(1747444310.949:692): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:11:50.949000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:11:51.192000 audit[3392]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=3392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:11:51.192000 audit[3392]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff287fac50 a2=0 a3=0 items=0 ppid=2161 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:51.269754 env[1553]: time="2025-05-17T01:11:51.269708747Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ed6851c9-7ea3-4ddf-b45e-58164a193db2,Namespace:default,Attempt:0,}" May 17 01:11:51.342462 systemd-networkd[1311]: cali60e51b789ff: Link UP May 17 01:11:51.349031 kernel: audit: type=1325 audit(1747444311.192:693): table=nat:72 family=2 entries=22 op=nft_register_rule pid=3392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:11:51.349064 kernel: audit: type=1300 audit(1747444311.192:693): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff287fac50 a2=0 a3=0 items=0 ppid=2161 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:51.349083 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 01:11:51.349099 kernel: audit: type=1327 audit(1747444311.192:693): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:11:51.192000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:11:51.376437 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 17 01:11:51.431196 kubelet[1906]: E0517 01:11:51.431148 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:51.462035 systemd-networkd[1311]: cali60e51b789ff: Gained carrier May 17 01:11:51.470398 env[1553]: 2025-05-17 01:11:51.300 [INFO][3394] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.37-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default ed6851c9-7ea3-4ddf-b45e-58164a193db2 2067 0 2025-05-17 01:11:50 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.67.80.37 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.37-k8s-nfs--server--provisioner--0-" May 17 01:11:51.470398 env[1553]: 2025-05-17 01:11:51.300 [INFO][3394] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.37-k8s-nfs--server--provisioner--0-eth0" May 17 01:11:51.470398 env[1553]: 2025-05-17 01:11:51.314 [INFO][3416] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f" HandleID="k8s-pod-network.161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f" Workload="10.67.80.37-k8s-nfs--server--provisioner--0-eth0" May 17 01:11:51.470398 env[1553]: 2025-05-17 01:11:51.314 [INFO][3416] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f" HandleID="k8s-pod-network.161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f" Workload="10.67.80.37-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004f640), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.37", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-17 01:11:51.314163862 +0000 UTC"}, Hostname:"10.67.80.37", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 01:11:51.470398 env[1553]: 2025-05-17 01:11:51.314 [INFO][3416] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:11:51.470398 env[1553]: 2025-05-17 01:11:51.314 [INFO][3416] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:11:51.470398 env[1553]: 2025-05-17 01:11:51.314 [INFO][3416] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.37' May 17 01:11:51.470398 env[1553]: 2025-05-17 01:11:51.320 [INFO][3416] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f" host="10.67.80.37" May 17 01:11:51.470398 env[1553]: 2025-05-17 01:11:51.325 [INFO][3416] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.80.37" May 17 01:11:51.470398 env[1553]: 2025-05-17 01:11:51.329 [INFO][3416] ipam/ipam.go 511: Trying affinity for 192.168.81.0/26 host="10.67.80.37" May 17 01:11:51.470398 env[1553]: 2025-05-17 01:11:51.331 [INFO][3416] ipam/ipam.go 158: Attempting to load block cidr=192.168.81.0/26 host="10.67.80.37" May 17 01:11:51.470398 env[1553]: 2025-05-17 01:11:51.333 [INFO][3416] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.81.0/26 host="10.67.80.37" May 17 01:11:51.470398 env[1553]: 2025-05-17 01:11:51.333 [INFO][3416] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.81.0/26 handle="k8s-pod-network.161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f" host="10.67.80.37" May 17 01:11:51.470398 env[1553]: 2025-05-17 01:11:51.334 [INFO][3416] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f May 17 01:11:51.470398 env[1553]: 2025-05-17 01:11:51.336 [INFO][3416] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.81.0/26 handle="k8s-pod-network.161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f" host="10.67.80.37" May 17 01:11:51.470398 env[1553]: 2025-05-17 01:11:51.340 [INFO][3416] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.81.3/26] block=192.168.81.0/26 handle="k8s-pod-network.161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f" host="10.67.80.37" May 17 01:11:51.470398 env[1553]: 2025-05-17 01:11:51.340 [INFO][3416] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.81.3/26] handle="k8s-pod-network.161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f" host="10.67.80.37" May 17 01:11:51.470398 env[1553]: 2025-05-17 01:11:51.340 [INFO][3416] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:11:51.470398 env[1553]: 2025-05-17 01:11:51.340 [INFO][3416] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.81.3/26] IPv6=[] ContainerID="161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f" HandleID="k8s-pod-network.161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f" Workload="10.67.80.37-k8s-nfs--server--provisioner--0-eth0" May 17 01:11:51.471068 env[1553]: 2025-05-17 01:11:51.341 [INFO][3394] cni-plugin/k8s.go 418: Populated endpoint ContainerID="161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.37-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.37-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ed6851c9-7ea3-4ddf-b45e-58164a193db2", ResourceVersion:"2067", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 11, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.37", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.81.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:11:51.471068 env[1553]: 2025-05-17 01:11:51.341 [INFO][3394] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.81.3/32] ContainerID="161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.37-k8s-nfs--server--provisioner--0-eth0" May 17 01:11:51.471068 env[1553]: 2025-05-17 01:11:51.341 [INFO][3394] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.37-k8s-nfs--server--provisioner--0-eth0" May 17 01:11:51.471068 env[1553]: 2025-05-17 01:11:51.462 [INFO][3394] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.37-k8s-nfs--server--provisioner--0-eth0" May 17 01:11:51.471251 env[1553]: 2025-05-17 01:11:51.462 [INFO][3394] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.37-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.37-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ed6851c9-7ea3-4ddf-b45e-58164a193db2", ResourceVersion:"2067", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 11, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.37", ContainerID:"161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.81.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"e6:71:be:69:3d:44", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:11:51.471251 env[1553]: 2025-05-17 01:11:51.469 [INFO][3394] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.37-k8s-nfs--server--provisioner--0-eth0" May 17 01:11:51.470000 audit[3444]: NETFILTER_CFG table=filter:73 family=2 entries=36 op=nft_register_rule pid=3444 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:11:51.474923 env[1553]: time="2025-05-17T01:11:51.474832941Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 01:11:51.474923 env[1553]: time="2025-05-17T01:11:51.474856629Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 01:11:51.474923 env[1553]: time="2025-05-17T01:11:51.474863514Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 01:11:51.475010 env[1553]: time="2025-05-17T01:11:51.474924064Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f pid=3454 runtime=io.containerd.runc.v2 May 17 01:11:51.481368 systemd[1]: Started cri-containerd-161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f.scope. May 17 01:11:51.470000 audit[3444]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffd22eaf920 a2=0 a3=7ffd22eaf90c items=0 ppid=2161 pid=3444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:51.626074 kernel: audit: type=1325 audit(1747444311.470:694): table=filter:73 family=2 entries=36 op=nft_register_rule pid=3444 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:11:51.626140 kernel: audit: type=1300 audit(1747444311.470:694): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffd22eaf920 a2=0 a3=7ffd22eaf90c items=0 ppid=2161 pid=3444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:51.626158 kernel: audit: type=1327 audit(1747444311.470:694): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:11:51.470000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:11:51.683580 kernel: audit: type=1400 audit(1747444311.536:695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.625000 audit[3444]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=3444 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:11:51.625000 audit[3444]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd22eaf920 a2=0 a3=0 items=0 ppid=2161 pid=3444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:51.625000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:11:51.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.745000 audit: BPF prog-id=118 op=LOAD May 17 01:11:51.745000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.745000 audit[3463]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3454 pid=3463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:51.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136316164313466616664663737356630306437313539343739303663 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3454 pid=3463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:51.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136316164313466616664663737356630306437313539343739303663 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit: BPF prog-id=119 op=LOAD May 17 01:11:51.746000 audit[3463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000985f0 items=0 ppid=3454 pid=3463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:51.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136316164313466616664663737356630306437313539343739303663 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit: BPF prog-id=120 op=LOAD May 17 01:11:51.746000 audit[3463]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000098638 items=0 ppid=3454 pid=3463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:51.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136316164313466616664663737356630306437313539343739303663 May 17 01:11:51.746000 audit: BPF prog-id=120 op=UNLOAD May 17 01:11:51.746000 audit: BPF prog-id=119 op=UNLOAD May 17 01:11:51.746000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { perfmon } for pid=3463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit[3463]: AVC avc: denied { bpf } for pid=3463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:51.746000 audit: BPF prog-id=121 op=LOAD May 17 01:11:51.746000 audit[3463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000098a48 items=0 ppid=3454 pid=3463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:51.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136316164313466616664663737356630306437313539343739303663 May 17 01:11:51.760000 audit[3483]: NETFILTER_CFG table=filter:75 family=2 entries=40 op=nft_register_chain pid=3483 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 01:11:51.760000 audit[3483]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffc9643cb80 a2=0 a3=7ffc9643cb6c items=0 ppid=2650 pid=3483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:51.760000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 01:11:51.763932 env[1553]: time="2025-05-17T01:11:51.763908793Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ed6851c9-7ea3-4ddf-b45e-58164a193db2,Namespace:default,Attempt:0,} returns sandbox id \"161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f\"" May 17 01:11:51.764637 env[1553]: time="2025-05-17T01:11:51.764622168Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 17 01:11:52.432021 kubelet[1906]: E0517 01:11:52.431966 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:53.135512 systemd-networkd[1311]: cali60e51b789ff: Gained IPv6LL May 17 01:11:53.432460 kubelet[1906]: E0517 01:11:53.432422 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:53.609036 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3218294841.mount: Deactivated successfully. May 17 01:11:54.433492 kubelet[1906]: E0517 01:11:54.433469 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:54.787788 env[1553]: time="2025-05-17T01:11:54.787706280Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:54.788372 env[1553]: time="2025-05-17T01:11:54.788325748Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:54.789278 env[1553]: time="2025-05-17T01:11:54.789268628Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:54.790277 env[1553]: time="2025-05-17T01:11:54.790252319Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:11:54.790792 env[1553]: time="2025-05-17T01:11:54.790740357Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 17 01:11:54.793129 env[1553]: time="2025-05-17T01:11:54.793094807Z" level=info msg="CreateContainer within sandbox \"161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 17 01:11:54.797807 env[1553]: time="2025-05-17T01:11:54.797791098Z" level=info msg="CreateContainer within sandbox \"161ad14fafdf775f00d715947906c98cfe6d85ebfa004fa9149349d318cc039f\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"0f6c675ac1e2802365c90079f9bd5b7f7827a310f13611fdb61e1887476728c8\"" May 17 01:11:54.798114 env[1553]: time="2025-05-17T01:11:54.798034144Z" level=info msg="StartContainer for \"0f6c675ac1e2802365c90079f9bd5b7f7827a310f13611fdb61e1887476728c8\"" May 17 01:11:54.808739 systemd[1]: Started cri-containerd-0f6c675ac1e2802365c90079f9bd5b7f7827a310f13611fdb61e1887476728c8.scope. May 17 01:11:54.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit: BPF prog-id=122 op=LOAD May 17 01:11:54.812000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3454 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:54.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066366336373561633165323830323336356339303037396639626435 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3454 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:54.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066366336373561633165323830323336356339303037396639626435 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit: BPF prog-id=123 op=LOAD May 17 01:11:54.812000 audit[3499]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002b51e0 items=0 ppid=3454 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:54.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066366336373561633165323830323336356339303037396639626435 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit: BPF prog-id=124 op=LOAD May 17 01:11:54.812000 audit[3499]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002b5228 items=0 ppid=3454 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:54.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066366336373561633165323830323336356339303037396639626435 May 17 01:11:54.812000 audit: BPF prog-id=124 op=UNLOAD May 17 01:11:54.812000 audit: BPF prog-id=123 op=UNLOAD May 17 01:11:54.812000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:11:54.812000 audit: BPF prog-id=125 op=LOAD May 17 01:11:54.812000 audit[3499]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002b5638 items=0 ppid=3454 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:54.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066366336373561633165323830323336356339303037396639626435 May 17 01:11:54.827368 env[1553]: time="2025-05-17T01:11:54.827331167Z" level=info msg="StartContainer for \"0f6c675ac1e2802365c90079f9bd5b7f7827a310f13611fdb61e1887476728c8\" returns successfully" May 17 01:11:54.844000 audit[3528]: AVC avc: denied { search } for pid=3528 comm="rpcbind" name="crypto" dev="proc" ino=32191 scontext=system_u:system_r:svirt_lxc_net_t:s0:c118,c857 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 01:11:54.844000 audit[3528]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fc8f24a30c0 a2=0 a3=0 items=0 ppid=3510 pid=3528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c118,c857 key=(null) May 17 01:11:54.844000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 17 01:11:54.863000 audit[3533]: AVC avc: denied { search } for pid=3533 comm="dbus-daemon" name="crypto" dev="proc" ino=32191 scontext=system_u:system_r:svirt_lxc_net_t:s0:c118,c857 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 01:11:54.863000 audit[3533]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fd523d3c0c0 a2=0 a3=0 items=0 ppid=3510 pid=3533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c118,c857 key=(null) May 17 01:11:54.863000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 17 01:11:54.865000 audit[3534]: AVC avc: denied { watch } for pid=3534 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537521 scontext=system_u:system_r:svirt_lxc_net_t:s0:c118,c857 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c118,c857 tclass=dir permissive=0 May 17 01:11:54.865000 audit[3534]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=563cb3677b50 a2=2c8 a3=7ffd853e4e3c items=0 ppid=3510 pid=3534 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c118,c857 key=(null) May 17 01:11:54.865000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 17 01:11:54.867000 audit[3535]: AVC avc: denied { read } for pid=3535 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=31052 scontext=system_u:system_r:svirt_lxc_net_t:s0:c118,c857 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 17 01:11:54.867000 audit[3535]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f09cc944320 a1=80000 a2=d a3=7ffde2d80b70 items=0 ppid=3510 pid=3535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c118,c857 key=(null) May 17 01:11:54.867000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 17 01:11:54.867000 audit[3535]: AVC avc: denied { search } for pid=3535 comm="ganesha.nfsd" name="crypto" dev="proc" ino=32191 scontext=system_u:system_r:svirt_lxc_net_t:s0:c118,c857 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 01:11:54.867000 audit[3535]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f09cbe980c0 a2=0 a3=0 items=0 ppid=3510 pid=3535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c118,c857 key=(null) May 17 01:11:54.867000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 17 01:11:55.433985 kubelet[1906]: E0517 01:11:55.433904 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:55.720000 audit[3559]: NETFILTER_CFG table=filter:76 family=2 entries=24 op=nft_register_rule pid=3559 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:11:55.720000 audit[3559]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fffada0a4f0 a2=0 a3=7fffada0a4dc items=0 ppid=2161 pid=3559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:55.720000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:11:55.733000 audit[3559]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=3559 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 01:11:55.733000 audit[3559]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffada0a4f0 a2=0 a3=7fffada0a4dc items=0 ppid=2161 pid=3559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:11:55.733000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 01:11:56.408354 kubelet[1906]: E0517 01:11:56.408218 1906 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:56.434844 kubelet[1906]: E0517 01:11:56.434767 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:57.435887 kubelet[1906]: E0517 01:11:57.435804 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:58.436099 kubelet[1906]: E0517 01:11:58.436014 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:11:59.436808 kubelet[1906]: E0517 01:11:59.436722 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:12:00.046512 kubelet[1906]: I0517 01:12:00.046342 1906 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=7.019158507 podStartE2EDuration="10.046272927s" podCreationTimestamp="2025-05-17 01:11:50 +0000 UTC" firstStartedPulling="2025-05-17 01:11:51.764483877 +0000 UTC m=+35.791502546" lastFinishedPulling="2025-05-17 01:11:54.791598297 +0000 UTC m=+38.818616966" observedRunningTime="2025-05-17 01:11:55.70559208 +0000 UTC m=+39.732610816" watchObservedRunningTime="2025-05-17 01:12:00.046272927 +0000 UTC m=+44.073291649" May 17 01:12:00.062229 systemd[1]: Created slice kubepods-besteffort-pod3ae56244_314a_4196_be64_2d56f5f0c574.slice. May 17 01:12:00.142475 kubelet[1906]: I0517 01:12:00.142391 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-9c7b65ba-dd43-420b-8f03-6af0ac262b5f\" (UniqueName: \"kubernetes.io/nfs/3ae56244-314a-4196-be64-2d56f5f0c574-pvc-9c7b65ba-dd43-420b-8f03-6af0ac262b5f\") pod \"test-pod-1\" (UID: \"3ae56244-314a-4196-be64-2d56f5f0c574\") " pod="default/test-pod-1" May 17 01:12:00.142755 kubelet[1906]: I0517 01:12:00.142530 1906 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bwdcl\" (UniqueName: \"kubernetes.io/projected/3ae56244-314a-4196-be64-2d56f5f0c574-kube-api-access-bwdcl\") pod \"test-pod-1\" (UID: \"3ae56244-314a-4196-be64-2d56f5f0c574\") " pod="default/test-pod-1" May 17 01:12:00.260000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:00.289334 kernel: Failed to create system directory netfs May 17 01:12:00.289427 kernel: kauditd_printk_skb: 140 callbacks suppressed May 17 01:12:00.289444 kernel: audit: type=1400 audit(1747444320.260:740): avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:00.289463 kernel: Failed to create system directory netfs May 17 01:12:00.289479 kernel: Failed to create system directory netfs May 17 01:12:00.316185 kernel: audit: type=1400 audit(1747444320.260:740): avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:00.260000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:00.404375 kernel: Failed to create system directory netfs May 17 01:12:00.430581 kernel: audit: type=1400 audit(1747444320.260:740): avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:00.260000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:00.437820 kubelet[1906]: E0517 01:12:00.437772 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:12:00.260000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:00.650357 kernel: audit: type=1400 audit(1747444320.260:740): avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:00.260000 audit[3578]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ea17d975e0 a1=153bc a2=55ea0aefb2b0 a3=5 items=0 ppid=873 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:12:00.260000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 01:12:00.826353 kernel: audit: type=1300 audit(1747444320.260:740): arch=c000003e syscall=175 success=yes exit=0 a0=55ea17d975e0 a1=153bc a2=55ea0aefb2b0 a3=5 items=0 ppid=873 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:12:00.826389 kernel: audit: type=1327 audit(1747444320.260:740): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 01:12:00.740000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:00.882001 kernel: Failed to create system directory fscache May 17 01:12:00.882034 kernel: audit: type=1400 audit(1747444320.740:741): avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:00.882049 kernel: Failed to create system directory fscache May 17 01:12:00.964863 kernel: audit: type=1400 audit(1747444320.740:741): avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:00.740000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:00.989573 kernel: Failed to create system directory fscache May 17 01:12:00.989603 kernel: Failed to create system directory fscache May 17 01:12:00.989635 kernel: Failed to create system directory fscache May 17 01:12:00.989668 kernel: Failed to create system directory fscache May 17 01:12:00.989696 kernel: Failed to create system directory fscache May 17 01:12:00.740000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.073370 kernel: audit: type=1400 audit(1747444320.740:741): avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.120976 kernel: Failed to create system directory fscache May 17 01:12:01.121009 kernel: audit: type=1400 audit(1747444320.740:741): avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:00.740000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.144418 kernel: Failed to create system directory fscache May 17 01:12:00.740000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:00.740000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:00.740000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:00.740000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:00.740000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:00.740000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.407600 kernel: Failed to create system directory fscache May 17 01:12:01.407657 kernel: Failed to create system directory fscache May 17 01:12:00.740000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.429228 kernel: Failed to create system directory fscache May 17 01:12:00.740000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.438771 kubelet[1906]: E0517 01:12:01.438732 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:12:01.450515 kernel: Failed to create system directory fscache May 17 01:12:00.740000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.471227 kernel: Failed to create system directory fscache May 17 01:12:00.740000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:00.740000 audit[3578]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ea17fac9c0 a1=4c0fc a2=55ea0aefb2b0 a3=5 items=0 ppid=873 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:12:00.740000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 01:12:01.511298 kernel: FS-Cache: Loaded May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.572921 kernel: Failed to create system directory sunrpc May 17 01:12:01.572997 kernel: Failed to create system directory sunrpc May 17 01:12:01.573013 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.591772 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.610127 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.628324 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.646529 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.664488 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.682018 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.699462 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.716432 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.733185 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.749488 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.765332 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.780791 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.795642 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.809911 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.823752 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.837156 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.850126 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.862680 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.874998 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.886817 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.898370 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.909296 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.920049 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.930573 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.940648 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.950243 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.959704 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.969153 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.978630 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.987981 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.997371 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.006323 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.014871 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.022977 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.030916 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.038493 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.045620 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.052311 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.058841 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.065368 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.071896 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.078425 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.084943 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.091503 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.097916 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.104165 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.110479 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.116765 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.123017 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.129309 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.135605 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.141869 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.148108 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.154385 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.160659 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.166934 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.173173 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.179474 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.185718 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.191946 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.198179 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.204459 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.210636 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.216874 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.223094 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.229380 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.235588 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.241801 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.248019 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.254222 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.260446 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.266677 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.272893 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.279139 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.285381 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.291564 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.297781 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.304010 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.310231 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.316450 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.322668 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.328923 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.335118 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.341315 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.347524 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.353727 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.359959 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.366206 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.372394 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.378623 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.384880 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.391073 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.397303 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.403528 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.409776 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.415975 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.422204 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.428429 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.434670 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.439608 kubelet[1906]: E0517 01:12:02.439561 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:12:02.440926 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.447164 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.453348 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.459692 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.465932 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.472143 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.478460 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.484685 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.490914 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.497158 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.503408 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.509640 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.515882 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.522137 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.534631 kernel: Failed to create system directory sunrpc May 17 01:12:02.534660 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.540872 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.547113 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.553374 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.559630 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.565913 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.572106 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.578381 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.584631 kernel: Failed to create system directory sunrpc May 17 01:12:01.524000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.610999 kernel: RPC: Registered named UNIX socket transport module. May 17 01:12:02.611030 kernel: RPC: Registered udp transport module. May 17 01:12:02.611046 kernel: RPC: Registered tcp transport module. May 17 01:12:02.617300 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 17 01:12:01.524000 audit[3578]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ea17ff8ad0 a1=1a814c a2=55ea0aefb2b0 a3=5 items=6 ppid=873 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:12:01.524000 audit: CWD cwd="/" May 17 01:12:01.524000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:12:01.524000 audit: PATH item=1 name=(null) inode=25357 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:12:01.524000 audit: PATH item=2 name=(null) inode=25357 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:12:01.524000 audit: PATH item=3 name=(null) inode=25358 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:12:01.524000 audit: PATH item=4 name=(null) inode=25357 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:12:01.524000 audit: PATH item=5 name=(null) inode=25359 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 01:12:01.524000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.697204 kernel: Failed to create system directory nfs May 17 01:12:02.697239 kernel: Failed to create system directory nfs May 17 01:12:02.697256 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.703821 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.717114 kernel: Failed to create system directory nfs May 17 01:12:02.717138 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.723744 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.730356 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.737025 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.743637 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.750267 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.756904 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.763519 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.770146 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.776779 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.783404 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.790042 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.796672 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.803285 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.809923 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.816531 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.823165 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.829775 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.836401 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.843054 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.849680 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.856311 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.862942 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.869580 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.876202 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.882829 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.889456 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.896078 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.902697 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.909325 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.915948 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.922582 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.929205 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.935837 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.942475 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.949154 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.955850 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.962515 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.969141 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.975605 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.981924 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.988249 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.994425 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.006350 kernel: Failed to create system directory nfs May 17 01:12:03.006373 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.012323 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.018272 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.024235 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.030177 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.036115 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.042072 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.048031 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.053992 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.059966 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.065934 kernel: Failed to create system directory nfs May 17 01:12:02.675000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:02.675000 audit[3578]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ea18219a10 a1=16eae4 a2=55ea0aefb2b0 a3=5 items=0 ppid=873 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:12:02.675000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 01:12:03.093340 kernel: FS-Cache: Netfs 'nfs' registered for caching May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.131836 kernel: Failed to create system directory nfs4 May 17 01:12:03.131861 kernel: Failed to create system directory nfs4 May 17 01:12:03.131874 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.138164 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.144508 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.150814 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.157139 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.163479 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.169786 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.176127 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.182443 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.188828 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.195155 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.201532 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.207903 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.214238 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.220633 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.226975 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.233297 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.239619 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.245950 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.252271 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.258601 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.264947 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.271292 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.277632 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.283943 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.290286 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.296636 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.302941 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.309270 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.315587 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.321911 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.328224 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.334551 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.340898 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.347242 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.353573 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.359912 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.366260 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.372612 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.378969 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.385302 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.391683 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.398031 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.410739 kernel: Failed to create system directory nfs4 May 17 01:12:03.410805 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.416941 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.423008 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.429045 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.435069 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.440420 kubelet[1906]: E0517 01:12:03.440378 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:12:03.441117 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.447132 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.453214 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.459279 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.465313 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.477540 kernel: Failed to create system directory nfs4 May 17 01:12:03.477603 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.483609 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.489618 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.495645 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.501665 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.507660 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.513654 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.519677 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.525682 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.531701 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.537694 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.543733 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.549694 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.555690 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.561678 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.567664 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.573649 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.579635 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.585595 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.591553 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.597504 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.603490 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.615329 kernel: Failed to create system directory nfs4 May 17 01:12:03.615387 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.627196 kernel: Failed to create system directory nfs4 May 17 01:12:03.627220 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.633137 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.639079 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.645013 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.650952 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.656895 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.662841 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.668798 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.674728 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.680665 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.686631 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.692545 kernel: Failed to create system directory nfs4 May 17 01:12:03.110000 audit[3585]: AVC avc: denied { confidentiality } for pid=3585 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.807198 kernel: NFS: Registering the id_resolver key type May 17 01:12:03.807229 kernel: Key type id_resolver registered May 17 01:12:03.807242 kernel: Key type id_legacy registered May 17 01:12:03.110000 audit[3585]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fc30f203010 a1=209404 a2=564726ae12b0 a3=5 items=0 ppid=873 pid=3585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:12:03.110000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.843277 kernel: Failed to create system directory rpcgss May 17 01:12:03.843306 kernel: Failed to create system directory rpcgss May 17 01:12:03.843348 kernel: Failed to create system directory rpcgss May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.856490 kernel: Failed to create system directory rpcgss May 17 01:12:03.856547 kernel: Failed to create system directory rpcgss May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.863073 kernel: Failed to create system directory rpcgss May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.869660 kernel: Failed to create system directory rpcgss May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.882776 kernel: Failed to create system directory rpcgss May 17 01:12:03.882801 kernel: Failed to create system directory rpcgss May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.889445 kernel: Failed to create system directory rpcgss May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.896075 kernel: Failed to create system directory rpcgss May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.902695 kernel: Failed to create system directory rpcgss May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.909316 kernel: Failed to create system directory rpcgss May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.915948 kernel: Failed to create system directory rpcgss May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.922616 kernel: Failed to create system directory rpcgss May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.929255 kernel: Failed to create system directory rpcgss May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.935928 kernel: Failed to create system directory rpcgss May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.942539 kernel: Failed to create system directory rpcgss May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.949185 kernel: Failed to create system directory rpcgss May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.955812 kernel: Failed to create system directory rpcgss May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.962468 kernel: Failed to create system directory rpcgss May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.969142 kernel: Failed to create system directory rpcgss May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.975781 kernel: Failed to create system directory rpcgss May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.982424 kernel: Failed to create system directory rpcgss May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.989082 kernel: Failed to create system directory rpcgss May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.995741 kernel: Failed to create system directory rpcgss May 17 01:12:03.826000 audit[3586]: AVC avc: denied { confidentiality } for pid=3586 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 01:12:03.826000 audit[3586]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f57016f0010 a1=70b64 a2=55a755a412b0 a3=5 items=0 ppid=873 pid=3586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:12:03.826000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 17 01:12:04.123761 nfsidmap[3595]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.7-n-39494cd0d6' May 17 01:12:04.132029 nfsidmap[3596]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.7-n-39494cd0d6' May 17 01:12:04.154000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 01:12:04.154000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 01:12:04.154000 audit[1639]: AVC avc: denied { watch_reads } for pid=1639 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 01:12:04.154000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 01:12:04.154000 audit[1639]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56458e4a5dd0 a2=10 a3=4eb11899954f175e items=0 ppid=1 pid=1639 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:12:04.154000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 01:12:04.154000 audit[1639]: AVC avc: denied { watch_reads } for pid=1639 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 01:12:04.154000 audit[1639]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56458e4a5dd0 a2=10 a3=4eb11899954f175e items=0 ppid=1 pid=1639 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:12:04.154000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 01:12:04.154000 audit[1639]: AVC avc: denied { watch_reads } for pid=1639 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 01:12:04.154000 audit[1639]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56458e4a5dd0 a2=10 a3=4eb11899954f175e items=0 ppid=1 pid=1639 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:12:04.154000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 01:12:04.269197 env[1553]: time="2025-05-17T01:12:04.269056805Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:3ae56244-314a-4196-be64-2d56f5f0c574,Namespace:default,Attempt:0,}" May 17 01:12:04.441276 kubelet[1906]: E0517 01:12:04.441160 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:12:04.667029 systemd-networkd[1311]: cali5ec59c6bf6e: Link UP May 17 01:12:04.684395 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 01:12:04.684432 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 17 01:12:04.684675 systemd-networkd[1311]: cali5ec59c6bf6e: Gained carrier May 17 01:12:04.701565 env[1553]: 2025-05-17 01:12:04.578 [INFO][3598] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.37-k8s-test--pod--1-eth0 default 3ae56244-314a-4196-be64-2d56f5f0c574 2121 0 2025-05-17 01:11:51 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.37 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.37-k8s-test--pod--1-" May 17 01:12:04.701565 env[1553]: 2025-05-17 01:12:04.578 [INFO][3598] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.37-k8s-test--pod--1-eth0" May 17 01:12:04.701565 env[1553]: 2025-05-17 01:12:04.596 [INFO][3618] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3" HandleID="k8s-pod-network.b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3" Workload="10.67.80.37-k8s-test--pod--1-eth0" May 17 01:12:04.701565 env[1553]: 2025-05-17 01:12:04.596 [INFO][3618] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3" HandleID="k8s-pod-network.b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3" Workload="10.67.80.37-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000447260), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.37", "pod":"test-pod-1", "timestamp":"2025-05-17 01:12:04.596470269 +0000 UTC"}, Hostname:"10.67.80.37", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 01:12:04.701565 env[1553]: 2025-05-17 01:12:04.596 [INFO][3618] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 01:12:04.701565 env[1553]: 2025-05-17 01:12:04.596 [INFO][3618] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 01:12:04.701565 env[1553]: 2025-05-17 01:12:04.596 [INFO][3618] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.37' May 17 01:12:04.701565 env[1553]: 2025-05-17 01:12:04.603 [INFO][3618] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3" host="10.67.80.37" May 17 01:12:04.701565 env[1553]: 2025-05-17 01:12:04.614 [INFO][3618] ipam/ipam.go 394: Looking up existing affinities for host host="10.67.80.37" May 17 01:12:04.701565 env[1553]: 2025-05-17 01:12:04.626 [INFO][3618] ipam/ipam.go 511: Trying affinity for 192.168.81.0/26 host="10.67.80.37" May 17 01:12:04.701565 env[1553]: 2025-05-17 01:12:04.630 [INFO][3618] ipam/ipam.go 158: Attempting to load block cidr=192.168.81.0/26 host="10.67.80.37" May 17 01:12:04.701565 env[1553]: 2025-05-17 01:12:04.635 [INFO][3618] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.81.0/26 host="10.67.80.37" May 17 01:12:04.701565 env[1553]: 2025-05-17 01:12:04.636 [INFO][3618] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.81.0/26 handle="k8s-pod-network.b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3" host="10.67.80.37" May 17 01:12:04.701565 env[1553]: 2025-05-17 01:12:04.639 [INFO][3618] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3 May 17 01:12:04.701565 env[1553]: 2025-05-17 01:12:04.646 [INFO][3618] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.81.0/26 handle="k8s-pod-network.b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3" host="10.67.80.37" May 17 01:12:04.701565 env[1553]: 2025-05-17 01:12:04.657 [INFO][3618] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.81.4/26] block=192.168.81.0/26 handle="k8s-pod-network.b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3" host="10.67.80.37" May 17 01:12:04.701565 env[1553]: 2025-05-17 01:12:04.658 [INFO][3618] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.81.4/26] handle="k8s-pod-network.b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3" host="10.67.80.37" May 17 01:12:04.701565 env[1553]: 2025-05-17 01:12:04.658 [INFO][3618] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 01:12:04.701565 env[1553]: 2025-05-17 01:12:04.658 [INFO][3618] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.81.4/26] IPv6=[] ContainerID="b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3" HandleID="k8s-pod-network.b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3" Workload="10.67.80.37-k8s-test--pod--1-eth0" May 17 01:12:04.701565 env[1553]: 2025-05-17 01:12:04.661 [INFO][3598] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.37-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.37-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"3ae56244-314a-4196-be64-2d56f5f0c574", ResourceVersion:"2121", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 11, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.37", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.81.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:12:04.704022 env[1553]: 2025-05-17 01:12:04.661 [INFO][3598] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.81.4/32] ContainerID="b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.37-k8s-test--pod--1-eth0" May 17 01:12:04.704022 env[1553]: 2025-05-17 01:12:04.662 [INFO][3598] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.37-k8s-test--pod--1-eth0" May 17 01:12:04.704022 env[1553]: 2025-05-17 01:12:04.666 [INFO][3598] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.37-k8s-test--pod--1-eth0" May 17 01:12:04.704022 env[1553]: 2025-05-17 01:12:04.684 [INFO][3598] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.37-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.37-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"3ae56244-314a-4196-be64-2d56f5f0c574", ResourceVersion:"2121", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 1, 11, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.37", ContainerID:"b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.81.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"3a:20:0f:d7:48:56", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 01:12:04.704022 env[1553]: 2025-05-17 01:12:04.697 [INFO][3598] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.37-k8s-test--pod--1-eth0" May 17 01:12:04.726000 audit[3641]: NETFILTER_CFG table=filter:78 family=2 entries=40 op=nft_register_chain pid=3641 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 01:12:04.726000 audit[3641]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffd926920d0 a2=0 a3=7ffd926920bc items=0 ppid=2650 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:12:04.726000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 01:12:04.810404 env[1553]: time="2025-05-17T01:12:04.810234989Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 01:12:04.810404 env[1553]: time="2025-05-17T01:12:04.810342709Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 01:12:04.810404 env[1553]: time="2025-05-17T01:12:04.810379677Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 01:12:04.810864 env[1553]: time="2025-05-17T01:12:04.810757433Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3 pid=3649 runtime=io.containerd.runc.v2 May 17 01:12:04.836508 systemd[1]: Started cri-containerd-b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3.scope. May 17 01:12:04.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.862000 audit: BPF prog-id=126 op=LOAD May 17 01:12:04.863000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.863000 audit[3659]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3649 pid=3659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:12:04.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233326432353363346333633130326366333637623336383339326361 May 17 01:12:04.863000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.863000 audit[3659]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3649 pid=3659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:12:04.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233326432353363346333633130326366333637623336383339326361 May 17 01:12:04.863000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.863000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.863000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.863000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.863000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.863000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.863000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.863000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.863000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.863000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.863000 audit: BPF prog-id=127 op=LOAD May 17 01:12:04.863000 audit[3659]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00037e2e0 items=0 ppid=3649 pid=3659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:12:04.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233326432353363346333633130326366333637623336383339326361 May 17 01:12:04.864000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.864000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.864000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.864000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.864000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.864000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.864000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.864000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.864000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.864000 audit: BPF prog-id=128 op=LOAD May 17 01:12:04.864000 audit[3659]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00037e328 items=0 ppid=3649 pid=3659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:12:04.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233326432353363346333633130326366333637623336383339326361 May 17 01:12:04.864000 audit: BPF prog-id=128 op=UNLOAD May 17 01:12:04.864000 audit: BPF prog-id=127 op=UNLOAD May 17 01:12:04.864000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.864000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.864000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.864000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.864000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.864000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.864000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.864000 audit[3659]: AVC avc: denied { perfmon } for pid=3659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.864000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.864000 audit[3659]: AVC avc: denied { bpf } for pid=3659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:04.864000 audit: BPF prog-id=129 op=LOAD May 17 01:12:04.864000 audit[3659]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00037e738 items=0 ppid=3649 pid=3659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:12:04.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233326432353363346333633130326366333637623336383339326361 May 17 01:12:04.919639 env[1553]: time="2025-05-17T01:12:04.919602358Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:3ae56244-314a-4196-be64-2d56f5f0c574,Namespace:default,Attempt:0,} returns sandbox id \"b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3\"" May 17 01:12:04.920397 env[1553]: time="2025-05-17T01:12:04.920377771Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 17 01:12:05.442357 kubelet[1906]: E0517 01:12:05.442229 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:12:06.132451 env[1553]: time="2025-05-17T01:12:06.132404294Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:12:06.133059 env[1553]: time="2025-05-17T01:12:06.133005593Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:12:06.134407 env[1553]: time="2025-05-17T01:12:06.134339610Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:12:06.135298 env[1553]: time="2025-05-17T01:12:06.135254530Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 01:12:06.135752 env[1553]: time="2025-05-17T01:12:06.135708152Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 17 01:12:06.137503 env[1553]: time="2025-05-17T01:12:06.137490253Z" level=info msg="CreateContainer within sandbox \"b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 17 01:12:06.141871 env[1553]: time="2025-05-17T01:12:06.141824728Z" level=info msg="CreateContainer within sandbox \"b32d253c4c3c102cf367b368392ca5deff728b3539314254bebd8ff846d0d0a3\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"b4410bce46acdada292876d85ee72de8a6280ca9a174cbdd37ac0126ab8e0216\"" May 17 01:12:06.142078 env[1553]: time="2025-05-17T01:12:06.142029990Z" level=info msg="StartContainer for \"b4410bce46acdada292876d85ee72de8a6280ca9a174cbdd37ac0126ab8e0216\"" May 17 01:12:06.143140 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3131019379.mount: Deactivated successfully. May 17 01:12:06.152721 systemd[1]: Started cri-containerd-b4410bce46acdada292876d85ee72de8a6280ca9a174cbdd37ac0126ab8e0216.scope. May 17 01:12:06.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.166332 kernel: kauditd_printk_skb: 405 callbacks suppressed May 17 01:12:06.166385 kernel: audit: type=1400 audit(1747444326.157:771): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.193354 kernel: audit: type=1400 audit(1747444326.157:772): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.250756 kernel: audit: type=1400 audit(1747444326.157:773): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.250787 kernel: audit: type=1400 audit(1747444326.157:774): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.282701 kernel: audit: type=1400 audit(1747444326.157:775): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.316459 kernel: audit: type=1400 audit(1747444326.157:776): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.320417 systemd-networkd[1311]: cali5ec59c6bf6e: Gained IPv6LL May 17 01:12:06.351990 kernel: audit: type=1400 audit(1747444326.157:777): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.389218 kernel: audit: type=1400 audit(1747444326.157:778): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.428120 kernel: audit: type=1400 audit(1747444326.157:779): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.443358 kubelet[1906]: E0517 01:12:06.443325 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:12:06.467931 kernel: audit: type=1400 audit(1747444326.191:780): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.191000 audit: BPF prog-id=130 op=LOAD May 17 01:12:06.191000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.191000 audit[3688]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3649 pid=3688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:12:06.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234343130626365343661636461646132393238373664383565653732 May 17 01:12:06.191000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.191000 audit[3688]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3649 pid=3688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:12:06.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234343130626365343661636461646132393238373664383565653732 May 17 01:12:06.191000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.191000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.191000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.191000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.191000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.191000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.191000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.191000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.191000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.191000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.191000 audit: BPF prog-id=131 op=LOAD May 17 01:12:06.191000 audit[3688]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003008d0 items=0 ppid=3649 pid=3688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:12:06.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234343130626365343661636461646132393238373664383565653732 May 17 01:12:06.249000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.249000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.249000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.249000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.249000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.249000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.249000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.249000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.249000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.249000 audit: BPF prog-id=132 op=LOAD May 17 01:12:06.249000 audit[3688]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000300918 items=0 ppid=3649 pid=3688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:12:06.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234343130626365343661636461646132393238373664383565653732 May 17 01:12:06.315000 audit: BPF prog-id=132 op=UNLOAD May 17 01:12:06.315000 audit: BPF prog-id=131 op=UNLOAD May 17 01:12:06.315000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.315000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.315000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.315000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.315000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.315000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.315000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.315000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.315000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.315000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 01:12:06.315000 audit: BPF prog-id=133 op=LOAD May 17 01:12:06.315000 audit[3688]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000300d28 items=0 ppid=3649 pid=3688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 01:12:06.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234343130626365343661636461646132393238373664383565653732 May 17 01:12:06.513833 env[1553]: time="2025-05-17T01:12:06.513811031Z" level=info msg="StartContainer for \"b4410bce46acdada292876d85ee72de8a6280ca9a174cbdd37ac0126ab8e0216\" returns successfully" May 17 01:12:06.734650 kubelet[1906]: I0517 01:12:06.734494 1906 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=14.518301986 podStartE2EDuration="15.734461837s" podCreationTimestamp="2025-05-17 01:11:51 +0000 UTC" firstStartedPulling="2025-05-17 01:12:04.92015974 +0000 UTC m=+48.947178417" lastFinishedPulling="2025-05-17 01:12:06.136319598 +0000 UTC m=+50.163338268" observedRunningTime="2025-05-17 01:12:06.734178082 +0000 UTC m=+50.761196815" watchObservedRunningTime="2025-05-17 01:12:06.734461837 +0000 UTC m=+50.761480555" May 17 01:12:07.443749 kubelet[1906]: E0517 01:12:07.443622 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 01:12:08.444369 kubelet[1906]: E0517 01:12:08.444250 1906 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"