May 17 00:35:15.132210 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 00:35:15.132256 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:35:15.132277 kernel: BIOS-provided physical RAM map: May 17 00:35:15.132296 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved May 17 00:35:15.132316 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable May 17 00:35:15.132331 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved May 17 00:35:15.132354 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable May 17 00:35:15.132372 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved May 17 00:35:15.132392 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bd277fff] usable May 17 00:35:15.132408 kernel: BIOS-e820: [mem 0x00000000bd278000-0x00000000bd281fff] ACPI data May 17 00:35:15.132426 kernel: BIOS-e820: [mem 0x00000000bd282000-0x00000000bf8ecfff] usable May 17 00:35:15.132455 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved May 17 00:35:15.132470 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data May 17 00:35:15.132489 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS May 17 00:35:15.132518 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable May 17 00:35:15.132538 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved May 17 00:35:15.132559 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable May 17 00:35:15.132579 kernel: NX (Execute Disable) protection: active May 17 00:35:15.132600 kernel: efi: EFI v2.70 by EDK II May 17 00:35:15.132621 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd278018 May 17 00:35:15.132642 kernel: random: crng init done May 17 00:35:15.132663 kernel: SMBIOS 2.4 present. May 17 00:35:15.132690 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 May 17 00:35:15.132711 kernel: Hypervisor detected: KVM May 17 00:35:15.132732 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 17 00:35:15.132754 kernel: kvm-clock: cpu 0, msr 1ef19a001, primary cpu clock May 17 00:35:15.132776 kernel: kvm-clock: using sched offset of 13521513010 cycles May 17 00:35:15.132800 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 17 00:35:15.132821 kernel: tsc: Detected 2299.998 MHz processor May 17 00:35:15.132837 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 00:35:15.132858 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 00:35:15.132877 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 May 17 00:35:15.132900 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 00:35:15.132952 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 May 17 00:35:15.132970 kernel: Using GB pages for direct mapping May 17 00:35:15.132987 kernel: Secure boot disabled May 17 00:35:15.133021 kernel: ACPI: Early table checksum verification disabled May 17 00:35:15.133042 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) May 17 00:35:15.133064 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) May 17 00:35:15.133085 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) May 17 00:35:15.133114 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) May 17 00:35:15.133134 kernel: ACPI: FACS 0x00000000BFBF2000 000040 May 17 00:35:15.133171 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20240322) May 17 00:35:15.133192 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) May 17 00:35:15.133211 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) May 17 00:35:15.133229 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) May 17 00:35:15.133257 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) May 17 00:35:15.133281 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) May 17 00:35:15.133304 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] May 17 00:35:15.133328 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] May 17 00:35:15.133347 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] May 17 00:35:15.133369 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] May 17 00:35:15.133390 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] May 17 00:35:15.133410 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] May 17 00:35:15.133432 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] May 17 00:35:15.133456 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] May 17 00:35:15.133475 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] May 17 00:35:15.133496 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 17 00:35:15.133520 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 17 00:35:15.133543 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] May 17 00:35:15.133567 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] May 17 00:35:15.133590 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] May 17 00:35:15.133614 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] May 17 00:35:15.133639 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] May 17 00:35:15.133668 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] May 17 00:35:15.133691 kernel: Zone ranges: May 17 00:35:15.133715 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 00:35:15.133739 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 17 00:35:15.133762 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] May 17 00:35:15.133787 kernel: Movable zone start for each node May 17 00:35:15.133808 kernel: Early memory node ranges May 17 00:35:15.133826 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] May 17 00:35:15.133851 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] May 17 00:35:15.133874 kernel: node 0: [mem 0x0000000000100000-0x00000000bd277fff] May 17 00:35:15.133898 kernel: node 0: [mem 0x00000000bd282000-0x00000000bf8ecfff] May 17 00:35:15.133939 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] May 17 00:35:15.133958 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] May 17 00:35:15.133976 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] May 17 00:35:15.133994 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:35:15.134038 kernel: On node 0, zone DMA: 11 pages in unavailable ranges May 17 00:35:15.134056 kernel: On node 0, zone DMA: 104 pages in unavailable ranges May 17 00:35:15.134075 kernel: On node 0, zone DMA32: 10 pages in unavailable ranges May 17 00:35:15.134098 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges May 17 00:35:15.134116 kernel: On node 0, zone Normal: 32 pages in unavailable ranges May 17 00:35:15.134134 kernel: ACPI: PM-Timer IO Port: 0xb008 May 17 00:35:15.134152 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 17 00:35:15.134170 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 17 00:35:15.134188 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 17 00:35:15.134206 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 17 00:35:15.134224 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 17 00:35:15.134242 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 17 00:35:15.134264 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 00:35:15.134283 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 17 00:35:15.134301 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices May 17 00:35:15.134319 kernel: Booting paravirtualized kernel on KVM May 17 00:35:15.134337 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 00:35:15.134355 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 17 00:35:15.134373 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 17 00:35:15.134391 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 17 00:35:15.134409 kernel: pcpu-alloc: [0] 0 1 May 17 00:35:15.134430 kernel: kvm-guest: PV spinlocks enabled May 17 00:35:15.134448 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 17 00:35:15.134468 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932270 May 17 00:35:15.134486 kernel: Policy zone: Normal May 17 00:35:15.134506 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:35:15.134525 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:35:15.134543 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) May 17 00:35:15.134561 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 17 00:35:15.134579 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:35:15.134601 kernel: Memory: 7515412K/7860544K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 344872K reserved, 0K cma-reserved) May 17 00:35:15.134620 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 17 00:35:15.134638 kernel: Kernel/User page tables isolation: enabled May 17 00:35:15.134656 kernel: ftrace: allocating 34585 entries in 136 pages May 17 00:35:15.134674 kernel: ftrace: allocated 136 pages with 2 groups May 17 00:35:15.134692 kernel: rcu: Hierarchical RCU implementation. May 17 00:35:15.134711 kernel: rcu: RCU event tracing is enabled. May 17 00:35:15.134729 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 17 00:35:15.134752 kernel: Rude variant of Tasks RCU enabled. May 17 00:35:15.134783 kernel: Tracing variant of Tasks RCU enabled. May 17 00:35:15.134802 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:35:15.134825 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 17 00:35:15.134844 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 17 00:35:15.134863 kernel: Console: colour dummy device 80x25 May 17 00:35:15.134883 kernel: printk: console [ttyS0] enabled May 17 00:35:15.134924 kernel: ACPI: Core revision 20210730 May 17 00:35:15.134944 kernel: APIC: Switch to symmetric I/O mode setup May 17 00:35:15.134963 kernel: x2apic enabled May 17 00:35:15.134986 kernel: Switched APIC routing to physical x2apic. May 17 00:35:15.135012 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 May 17 00:35:15.135032 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns May 17 00:35:15.135051 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) May 17 00:35:15.135071 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 May 17 00:35:15.135089 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 May 17 00:35:15.135110 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 00:35:15.135134 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit May 17 00:35:15.135153 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall May 17 00:35:15.135172 kernel: Spectre V2 : Mitigation: IBRS May 17 00:35:15.135191 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 17 00:35:15.135210 kernel: RETBleed: Mitigation: IBRS May 17 00:35:15.135229 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 17 00:35:15.135248 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl May 17 00:35:15.135267 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 17 00:35:15.135286 kernel: MDS: Mitigation: Clear CPU buffers May 17 00:35:15.135310 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:35:15.135330 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 00:35:15.135349 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 00:35:15.135368 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 00:35:15.135387 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 00:35:15.135406 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 17 00:35:15.135425 kernel: Freeing SMP alternatives memory: 32K May 17 00:35:15.135444 kernel: pid_max: default: 32768 minimum: 301 May 17 00:35:15.135463 kernel: LSM: Security Framework initializing May 17 00:35:15.135486 kernel: SELinux: Initializing. May 17 00:35:15.135506 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:35:15.135525 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:35:15.135545 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) May 17 00:35:15.135564 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. May 17 00:35:15.135595 kernel: signal: max sigframe size: 1776 May 17 00:35:15.135615 kernel: rcu: Hierarchical SRCU implementation. May 17 00:35:15.135634 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 17 00:35:15.135653 kernel: smp: Bringing up secondary CPUs ... May 17 00:35:15.135677 kernel: x86: Booting SMP configuration: May 17 00:35:15.135698 kernel: .... node #0, CPUs: #1 May 17 00:35:15.135717 kernel: kvm-clock: cpu 1, msr 1ef19a041, secondary cpu clock May 17 00:35:15.135736 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. May 17 00:35:15.135757 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. May 17 00:35:15.135776 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:35:15.135795 kernel: smpboot: Max logical packages: 1 May 17 00:35:15.135814 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) May 17 00:35:15.135836 kernel: devtmpfs: initialized May 17 00:35:15.135855 kernel: x86/mm: Memory block size: 128MB May 17 00:35:15.135887 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) May 17 00:35:15.135905 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:35:15.135943 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 17 00:35:15.135965 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:35:15.135989 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:35:15.136014 kernel: audit: initializing netlink subsys (disabled) May 17 00:35:15.136206 kernel: audit: type=2000 audit(1747442113.969:1): state=initialized audit_enabled=0 res=1 May 17 00:35:15.136230 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:35:15.136250 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 00:35:15.136268 kernel: cpuidle: using governor menu May 17 00:35:15.136288 kernel: ACPI: bus type PCI registered May 17 00:35:15.136309 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:35:15.136328 kernel: dca service started, version 1.12.1 May 17 00:35:15.136486 kernel: PCI: Using configuration type 1 for base access May 17 00:35:15.136506 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 00:35:15.136526 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 00:35:15.136549 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:35:15.136707 kernel: ACPI: Added _OSI(Module Device) May 17 00:35:15.136728 kernel: ACPI: Added _OSI(Processor Device) May 17 00:35:15.136747 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:35:15.136766 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:35:15.136922 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:35:15.136944 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:35:15.136963 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:35:15.136984 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded May 17 00:35:15.137013 kernel: ACPI: Interpreter enabled May 17 00:35:15.137032 kernel: ACPI: PM: (supports S0 S3 S5) May 17 00:35:15.137052 kernel: ACPI: Using IOAPIC for interrupt routing May 17 00:35:15.137071 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 00:35:15.137091 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F May 17 00:35:15.137110 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 17 00:35:15.137376 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 17 00:35:15.137571 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 17 00:35:15.137600 kernel: PCI host bridge to bus 0000:00 May 17 00:35:15.137790 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 17 00:35:15.138001 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 17 00:35:15.138194 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 17 00:35:15.138357 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] May 17 00:35:15.138545 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 17 00:35:15.138777 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 17 00:35:15.139070 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 May 17 00:35:15.139696 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 May 17 00:35:15.139961 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI May 17 00:35:15.140222 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 May 17 00:35:15.148484 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] May 17 00:35:15.148720 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] May 17 00:35:15.148991 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 17 00:35:15.149222 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] May 17 00:35:15.149436 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] May 17 00:35:15.149653 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 May 17 00:35:15.149850 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] May 17 00:35:15.150105 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] May 17 00:35:15.150132 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 17 00:35:15.150159 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 17 00:35:15.150178 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 17 00:35:15.150200 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 17 00:35:15.150222 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 17 00:35:15.150245 kernel: iommu: Default domain type: Translated May 17 00:35:15.150265 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 00:35:15.150289 kernel: vgaarb: loaded May 17 00:35:15.150312 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:35:15.150336 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:35:15.150364 kernel: PTP clock support registered May 17 00:35:15.150387 kernel: Registered efivars operations May 17 00:35:15.150410 kernel: PCI: Using ACPI for IRQ routing May 17 00:35:15.150430 kernel: PCI: pci_cache_line_size set to 64 bytes May 17 00:35:15.150449 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] May 17 00:35:15.150468 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] May 17 00:35:15.150488 kernel: e820: reserve RAM buffer [mem 0xbd278000-0xbfffffff] May 17 00:35:15.150508 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] May 17 00:35:15.150527 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] May 17 00:35:15.150550 kernel: clocksource: Switched to clocksource kvm-clock May 17 00:35:15.150571 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:35:15.150593 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:35:15.150613 kernel: pnp: PnP ACPI init May 17 00:35:15.150632 kernel: pnp: PnP ACPI: found 7 devices May 17 00:35:15.150652 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 00:35:15.150672 kernel: NET: Registered PF_INET protocol family May 17 00:35:15.150692 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 17 00:35:15.150711 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) May 17 00:35:15.150735 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:35:15.150755 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) May 17 00:35:15.150775 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) May 17 00:35:15.150794 kernel: TCP: Hash tables configured (established 65536 bind 65536) May 17 00:35:15.150814 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) May 17 00:35:15.150834 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) May 17 00:35:15.150853 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:35:15.150872 kernel: NET: Registered PF_XDP protocol family May 17 00:35:15.151091 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 17 00:35:15.151262 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 17 00:35:15.151423 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 17 00:35:15.151579 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] May 17 00:35:15.151758 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 17 00:35:15.151782 kernel: PCI: CLS 0 bytes, default 64 May 17 00:35:15.151802 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 17 00:35:15.151829 kernel: software IO TLB: mapped [mem 0x00000000b7f7f000-0x00000000bbf7f000] (64MB) May 17 00:35:15.151850 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 17 00:35:15.151875 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns May 17 00:35:15.151897 kernel: clocksource: Switched to clocksource tsc May 17 00:35:15.151950 kernel: Initialise system trusted keyrings May 17 00:35:15.151970 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 May 17 00:35:15.151990 kernel: Key type asymmetric registered May 17 00:35:15.152016 kernel: Asymmetric key parser 'x509' registered May 17 00:35:15.152035 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:35:15.152059 kernel: io scheduler mq-deadline registered May 17 00:35:15.152079 kernel: io scheduler kyber registered May 17 00:35:15.152098 kernel: io scheduler bfq registered May 17 00:35:15.152117 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 00:35:15.152137 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 May 17 00:35:15.152339 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver May 17 00:35:15.152366 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 May 17 00:35:15.152556 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver May 17 00:35:15.152583 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 May 17 00:35:15.152774 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver May 17 00:35:15.152799 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:35:15.152820 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 00:35:15.152840 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A May 17 00:35:15.152859 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A May 17 00:35:15.152879 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A May 17 00:35:15.153284 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) May 17 00:35:15.153461 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 17 00:35:15.153487 kernel: i8042: Warning: Keylock active May 17 00:35:15.153506 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 17 00:35:15.153669 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 17 00:35:15.154140 kernel: rtc_cmos 00:00: RTC can wake from S4 May 17 00:35:15.154322 kernel: rtc_cmos 00:00: registered as rtc0 May 17 00:35:15.154533 kernel: rtc_cmos 00:00: setting system clock to 2025-05-17T00:35:14 UTC (1747442114) May 17 00:35:15.154728 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram May 17 00:35:15.154759 kernel: intel_pstate: CPU model not supported May 17 00:35:15.154791 kernel: pstore: Registered efi as persistent store backend May 17 00:35:15.154817 kernel: NET: Registered PF_INET6 protocol family May 17 00:35:15.154843 kernel: Segment Routing with IPv6 May 17 00:35:15.154869 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:35:15.154894 kernel: NET: Registered PF_PACKET protocol family May 17 00:35:15.154944 kernel: Key type dns_resolver registered May 17 00:35:15.154969 kernel: IPI shorthand broadcast: enabled May 17 00:35:15.154995 kernel: sched_clock: Marking stable (805220923, 168557333)->(1050574260, -76796004) May 17 00:35:15.155029 kernel: registered taskstats version 1 May 17 00:35:15.155059 kernel: Loading compiled-in X.509 certificates May 17 00:35:15.155084 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 17 00:35:15.155111 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 00:35:15.155136 kernel: Key type .fscrypt registered May 17 00:35:15.155161 kernel: Key type fscrypt-provisioning registered May 17 00:35:15.155187 kernel: pstore: Using crash dump compression: deflate May 17 00:35:15.155212 kernel: ima: Allocated hash algorithm: sha1 May 17 00:35:15.155238 kernel: ima: No architecture policies found May 17 00:35:15.155263 kernel: clk: Disabling unused clocks May 17 00:35:15.155292 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 00:35:15.155318 kernel: Write protecting the kernel read-only data: 28672k May 17 00:35:15.155343 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 00:35:15.155369 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 00:35:15.155395 kernel: Run /init as init process May 17 00:35:15.155420 kernel: with arguments: May 17 00:35:15.155445 kernel: /init May 17 00:35:15.155470 kernel: with environment: May 17 00:35:15.155495 kernel: HOME=/ May 17 00:35:15.155524 kernel: TERM=linux May 17 00:35:15.155549 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:35:15.155579 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:35:15.155610 systemd[1]: Detected virtualization kvm. May 17 00:35:15.155638 systemd[1]: Detected architecture x86-64. May 17 00:35:15.155664 systemd[1]: Running in initrd. May 17 00:35:15.155690 systemd[1]: No hostname configured, using default hostname. May 17 00:35:15.155720 systemd[1]: Hostname set to . May 17 00:35:15.155748 systemd[1]: Initializing machine ID from VM UUID. May 17 00:35:15.155776 systemd[1]: Queued start job for default target initrd.target. May 17 00:35:15.155802 systemd[1]: Started systemd-ask-password-console.path. May 17 00:35:15.155829 systemd[1]: Reached target cryptsetup.target. May 17 00:35:15.155855 systemd[1]: Reached target paths.target. May 17 00:35:15.155882 systemd[1]: Reached target slices.target. May 17 00:35:15.155921 systemd[1]: Reached target swap.target. May 17 00:35:15.155952 systemd[1]: Reached target timers.target. May 17 00:35:15.155981 systemd[1]: Listening on iscsid.socket. May 17 00:35:15.156015 systemd[1]: Listening on iscsiuio.socket. May 17 00:35:15.156043 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:35:15.156070 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:35:15.156097 systemd[1]: Listening on systemd-journald.socket. May 17 00:35:15.156125 systemd[1]: Listening on systemd-networkd.socket. May 17 00:35:15.156152 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:35:15.156183 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:35:15.156212 systemd[1]: Reached target sockets.target. May 17 00:35:15.156258 systemd[1]: Starting kmod-static-nodes.service... May 17 00:35:15.156290 systemd[1]: Finished network-cleanup.service. May 17 00:35:15.156318 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:35:15.156347 systemd[1]: Starting systemd-journald.service... May 17 00:35:15.156378 systemd[1]: Starting systemd-modules-load.service... May 17 00:35:15.156406 systemd[1]: Starting systemd-resolved.service... May 17 00:35:15.156434 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:35:15.156462 systemd[1]: Finished kmod-static-nodes.service. May 17 00:35:15.156495 systemd-journald[190]: Journal started May 17 00:35:15.156610 systemd-journald[190]: Runtime Journal (/run/log/journal/a513fb72616d75140cd4c382b968345a) is 8.0M, max 148.8M, 140.8M free. May 17 00:35:15.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.161975 kernel: audit: type=1130 audit(1747442115.155:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.162016 systemd[1]: Started systemd-journald.service. May 17 00:35:15.164735 systemd-modules-load[191]: Inserted module 'overlay' May 17 00:35:15.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.175824 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:35:15.195079 kernel: audit: type=1130 audit(1747442115.173:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.195124 kernel: audit: type=1130 audit(1747442115.183:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.185593 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:35:15.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.209636 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:35:15.225072 kernel: audit: type=1130 audit(1747442115.206:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.221490 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:35:15.229541 systemd-resolved[192]: Positive Trust Anchors: May 17 00:35:15.230364 systemd-resolved[192]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:35:15.230646 systemd-resolved[192]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:35:15.249931 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:35:15.252228 systemd-resolved[192]: Defaulting to hostname 'linux'. May 17 00:35:15.257423 systemd[1]: Started systemd-resolved.service. May 17 00:35:15.257682 systemd[1]: Reached target nss-lookup.target. May 17 00:35:15.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.264950 kernel: audit: type=1130 audit(1747442115.255:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.267677 systemd-modules-load[191]: Inserted module 'br_netfilter' May 17 00:35:15.268135 kernel: Bridge firewalling registered May 17 00:35:15.271453 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:35:15.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.275933 kernel: audit: type=1130 audit(1747442115.269:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.281408 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:35:15.295145 kernel: audit: type=1130 audit(1747442115.283:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.286475 systemd[1]: Starting dracut-cmdline.service... May 17 00:35:15.308997 dracut-cmdline[206]: dracut-dracut-053 May 17 00:35:15.314538 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:35:15.329122 kernel: SCSI subsystem initialized May 17 00:35:15.338299 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:35:15.338379 kernel: device-mapper: uevent: version 1.0.3 May 17 00:35:15.341927 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:35:15.347662 systemd-modules-load[191]: Inserted module 'dm_multipath' May 17 00:35:15.349008 systemd[1]: Finished systemd-modules-load.service. May 17 00:35:15.361061 kernel: audit: type=1130 audit(1747442115.350:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.354288 systemd[1]: Starting systemd-sysctl.service... May 17 00:35:15.372333 systemd[1]: Finished systemd-sysctl.service. May 17 00:35:15.388079 kernel: audit: type=1130 audit(1747442115.375:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.425947 kernel: Loading iSCSI transport class v2.0-870. May 17 00:35:15.447209 kernel: iscsi: registered transport (tcp) May 17 00:35:15.475208 kernel: iscsi: registered transport (qla4xxx) May 17 00:35:15.475305 kernel: QLogic iSCSI HBA Driver May 17 00:35:15.523875 systemd[1]: Finished dracut-cmdline.service. May 17 00:35:15.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.525723 systemd[1]: Starting dracut-pre-udev.service... May 17 00:35:15.588948 kernel: raid6: avx2x4 gen() 18361 MB/s May 17 00:35:15.609934 kernel: raid6: avx2x4 xor() 8012 MB/s May 17 00:35:15.630925 kernel: raid6: avx2x2 gen() 18265 MB/s May 17 00:35:15.651926 kernel: raid6: avx2x2 xor() 17898 MB/s May 17 00:35:15.672932 kernel: raid6: avx2x1 gen() 14280 MB/s May 17 00:35:15.693933 kernel: raid6: avx2x1 xor() 15626 MB/s May 17 00:35:15.714931 kernel: raid6: sse2x4 gen() 10898 MB/s May 17 00:35:15.735933 kernel: raid6: sse2x4 xor() 6651 MB/s May 17 00:35:15.756934 kernel: raid6: sse2x2 gen() 11937 MB/s May 17 00:35:15.777930 kernel: raid6: sse2x2 xor() 7310 MB/s May 17 00:35:15.798927 kernel: raid6: sse2x1 gen() 10426 MB/s May 17 00:35:15.824966 kernel: raid6: sse2x1 xor() 5169 MB/s May 17 00:35:15.825014 kernel: raid6: using algorithm avx2x4 gen() 18361 MB/s May 17 00:35:15.825043 kernel: raid6: .... xor() 8012 MB/s, rmw enabled May 17 00:35:15.830052 kernel: raid6: using avx2x2 recovery algorithm May 17 00:35:15.855947 kernel: xor: automatically using best checksumming function avx May 17 00:35:15.980950 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 00:35:15.993539 systemd[1]: Finished dracut-pre-udev.service. May 17 00:35:16.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.000000 audit: BPF prog-id=7 op=LOAD May 17 00:35:16.000000 audit: BPF prog-id=8 op=LOAD May 17 00:35:16.003693 systemd[1]: Starting systemd-udevd.service... May 17 00:35:16.021543 systemd-udevd[388]: Using default interface naming scheme 'v252'. May 17 00:35:16.030257 systemd[1]: Started systemd-udevd.service. May 17 00:35:16.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.049251 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:35:16.066171 dracut-pre-trigger[393]: rd.md=0: removing MD RAID activation May 17 00:35:16.105628 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:35:16.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.106959 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:35:16.187738 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:35:16.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.280932 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:35:16.329976 kernel: scsi host0: Virtio SCSI HBA May 17 00:35:16.358930 kernel: AVX2 version of gcm_enc/dec engaged. May 17 00:35:16.388053 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 May 17 00:35:16.388170 kernel: AES CTR mode by8 optimization enabled May 17 00:35:16.459208 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) May 17 00:35:16.518148 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks May 17 00:35:16.518350 kernel: sd 0:0:1:0: [sda] Write Protect is off May 17 00:35:16.518520 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 May 17 00:35:16.518701 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA May 17 00:35:16.518864 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 17 00:35:16.518882 kernel: GPT:17805311 != 25165823 May 17 00:35:16.518898 kernel: GPT:Alternate GPT header not at the end of the disk. May 17 00:35:16.518933 kernel: GPT:17805311 != 25165823 May 17 00:35:16.518975 kernel: GPT: Use GNU Parted to correct GPT errors. May 17 00:35:16.519001 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:35:16.519032 kernel: sd 0:0:1:0: [sda] Attached SCSI disk May 17 00:35:16.576317 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:35:16.587086 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (431) May 17 00:35:16.601201 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:35:16.611055 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:35:16.637364 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:35:16.673047 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:35:16.683324 systemd[1]: Starting disk-uuid.service... May 17 00:35:16.712511 disk-uuid[500]: Primary Header is updated. May 17 00:35:16.712511 disk-uuid[500]: Secondary Entries is updated. May 17 00:35:16.712511 disk-uuid[500]: Secondary Header is updated. May 17 00:35:16.737652 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:35:16.737705 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:35:17.748933 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:35:17.749163 disk-uuid[501]: The operation has completed successfully. May 17 00:35:17.823244 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:35:17.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:17.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:17.823433 systemd[1]: Finished disk-uuid.service. May 17 00:35:17.840551 systemd[1]: Starting verity-setup.service... May 17 00:35:17.869062 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 17 00:35:17.946519 systemd[1]: Found device dev-mapper-usr.device. May 17 00:35:17.949742 systemd[1]: Mounting sysusr-usr.mount... May 17 00:35:17.960626 systemd[1]: Finished verity-setup.service. May 17 00:35:17.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:18.058933 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:35:18.059740 systemd[1]: Mounted sysusr-usr.mount. May 17 00:35:18.068306 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:35:18.069410 systemd[1]: Starting ignition-setup.service... May 17 00:35:18.106916 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:35:18.106964 kernel: BTRFS info (device sda6): using free space tree May 17 00:35:18.106981 kernel: BTRFS info (device sda6): has skinny extents May 17 00:35:18.118938 kernel: BTRFS info (device sda6): enabling ssd optimizations May 17 00:35:18.126499 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:35:18.139492 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:35:18.161223 systemd[1]: Finished ignition-setup.service. May 17 00:35:18.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:18.163349 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:35:18.257361 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:35:18.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:18.257000 audit: BPF prog-id=9 op=LOAD May 17 00:35:18.260173 systemd[1]: Starting systemd-networkd.service... May 17 00:35:18.304193 systemd-networkd[673]: lo: Link UP May 17 00:35:18.304208 systemd-networkd[673]: lo: Gained carrier May 17 00:35:18.305372 systemd-networkd[673]: Enumeration completed May 17 00:35:18.305535 systemd[1]: Started systemd-networkd.service. May 17 00:35:18.306505 systemd-networkd[673]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:35:18.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:18.308867 systemd-networkd[673]: eth0: Link UP May 17 00:35:18.308874 systemd-networkd[673]: eth0: Gained carrier May 17 00:35:18.319346 systemd-networkd[673]: eth0: Overlong DHCP hostname received, shortened from 'ci-3510-3-7-nightly-20250516-2100-4d93bffd9d88d2951645.c.flatcar-212911.internal' to 'ci-3510-3-7-nightly-20250516-2100-4d93bffd9d88d2951645' May 17 00:35:18.319385 systemd-networkd[673]: eth0: DHCPv4 address 10.128.0.12/32, gateway 10.128.0.1 acquired from 169.254.169.254 May 17 00:35:18.341237 systemd[1]: Reached target network.target. May 17 00:35:18.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:18.361303 systemd[1]: Starting iscsiuio.service... May 17 00:35:18.435101 iscsid[683]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:35:18.435101 iscsid[683]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 17 00:35:18.435101 iscsid[683]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:35:18.435101 iscsid[683]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:35:18.435101 iscsid[683]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:35:18.435101 iscsid[683]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:35:18.435101 iscsid[683]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:35:18.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:18.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:18.397751 systemd[1]: Started iscsiuio.service. May 17 00:35:18.437107 ignition[585]: Ignition 2.14.0 May 17 00:35:18.416844 systemd[1]: Starting iscsid.service... May 17 00:35:18.437123 ignition[585]: Stage: fetch-offline May 17 00:35:18.447459 systemd[1]: Started iscsid.service. May 17 00:35:18.437197 ignition[585]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:18.478766 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:35:18.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:18.437241 ignition[585]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 17 00:35:18.521830 systemd[1]: Starting dracut-initqueue.service... May 17 00:35:18.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:18.463625 ignition[585]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 17 00:35:18.558482 systemd[1]: Starting ignition-fetch.service... May 17 00:35:18.464008 ignition[585]: parsed url from cmdline: "" May 17 00:35:18.588498 unknown[692]: fetched base config from "system" May 17 00:35:18.464015 ignition[585]: no config URL provided May 17 00:35:18.588511 unknown[692]: fetched base config from "system" May 17 00:35:18.464022 ignition[585]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:35:18.588519 unknown[692]: fetched user config from "gcp" May 17 00:35:18.464035 ignition[585]: no config at "/usr/lib/ignition/user.ign" May 17 00:35:18.594583 systemd[1]: Finished dracut-initqueue.service. May 17 00:35:18.464045 ignition[585]: failed to fetch config: resource requires networking May 17 00:35:18.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:18.612390 systemd[1]: Finished ignition-fetch.service. May 17 00:35:18.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:18.464492 ignition[585]: Ignition finished successfully May 17 00:35:18.628427 systemd[1]: Reached target remote-fs-pre.target. May 17 00:35:18.570627 ignition[692]: Ignition 2.14.0 May 17 00:35:18.644064 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:35:18.570638 ignition[692]: Stage: fetch May 17 00:35:18.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:18.661079 systemd[1]: Reached target remote-fs.target. May 17 00:35:18.570761 ignition[692]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:18.676302 systemd[1]: Starting dracut-pre-mount.service... May 17 00:35:18.570790 ignition[692]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 17 00:35:18.697709 systemd[1]: Starting ignition-kargs.service... May 17 00:35:18.579247 ignition[692]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 17 00:35:18.734649 systemd[1]: Finished dracut-pre-mount.service. May 17 00:35:18.579441 ignition[692]: parsed url from cmdline: "" May 17 00:35:18.741585 systemd[1]: Finished ignition-kargs.service. May 17 00:35:18.579447 ignition[692]: no config URL provided May 17 00:35:18.765547 systemd[1]: Starting ignition-disks.service... May 17 00:35:18.579454 ignition[692]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:35:18.801585 systemd[1]: Finished ignition-disks.service. May 17 00:35:18.579467 ignition[692]: no config at "/usr/lib/ignition/user.ign" May 17 00:35:18.809439 systemd[1]: Reached target initrd-root-device.target. May 17 00:35:18.579505 ignition[692]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 May 17 00:35:18.828208 systemd[1]: Reached target local-fs-pre.target. May 17 00:35:18.585205 ignition[692]: GET result: OK May 17 00:35:18.835275 systemd[1]: Reached target local-fs.target. May 17 00:35:18.585285 ignition[692]: parsing config with SHA512: 5348e4fd738893aaa44fac3139f97245f5a25ff62a38708cc0a1c58b2087965bddc6e5b4e1143f6ed4be6ce6da26cd22ad9c0510767628251f79d20f62051dd6 May 17 00:35:18.860223 systemd[1]: Reached target sysinit.target. May 17 00:35:18.589192 ignition[692]: fetch: fetch complete May 17 00:35:18.876215 systemd[1]: Reached target basic.target. May 17 00:35:18.589200 ignition[692]: fetch: fetch passed May 17 00:35:18.899754 systemd[1]: Starting systemd-fsck-root.service... May 17 00:35:18.589250 ignition[692]: Ignition finished successfully May 17 00:35:18.711522 ignition[703]: Ignition 2.14.0 May 17 00:35:18.711535 ignition[703]: Stage: kargs May 17 00:35:18.711702 ignition[703]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:18.711734 ignition[703]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 17 00:35:18.719428 ignition[703]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 17 00:35:18.720525 ignition[703]: kargs: kargs passed May 17 00:35:18.720573 ignition[703]: Ignition finished successfully May 17 00:35:18.777591 ignition[709]: Ignition 2.14.0 May 17 00:35:18.777601 ignition[709]: Stage: disks May 17 00:35:18.777743 ignition[709]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:18.777776 ignition[709]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 17 00:35:18.786199 ignition[709]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 17 00:35:18.787511 ignition[709]: disks: disks passed May 17 00:35:18.787565 ignition[709]: Ignition finished successfully May 17 00:35:18.943807 systemd-fsck[717]: ROOT: clean, 619/1628000 files, 124060/1617920 blocks May 17 00:35:19.088021 systemd[1]: Finished systemd-fsck-root.service. May 17 00:35:19.128138 kernel: kauditd_printk_skb: 22 callbacks suppressed May 17 00:35:19.128195 kernel: audit: type=1130 audit(1747442119.086:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:19.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:19.089961 systemd[1]: Mounting sysroot.mount... May 17 00:35:19.151226 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:35:19.145348 systemd[1]: Mounted sysroot.mount. May 17 00:35:19.158318 systemd[1]: Reached target initrd-root-fs.target. May 17 00:35:19.175322 systemd[1]: Mounting sysroot-usr.mount... May 17 00:35:19.189699 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 17 00:35:19.189762 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:35:19.189808 systemd[1]: Reached target ignition-diskful.target. May 17 00:35:19.270674 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (723) May 17 00:35:19.270727 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:35:19.270754 kernel: BTRFS info (device sda6): using free space tree May 17 00:35:19.205534 systemd[1]: Mounted sysroot-usr.mount. May 17 00:35:19.294090 kernel: BTRFS info (device sda6): has skinny extents May 17 00:35:19.231129 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:35:19.309076 kernel: BTRFS info (device sda6): enabling ssd optimizations May 17 00:35:19.309127 initrd-setup-root[728]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:35:19.256145 systemd[1]: Starting initrd-setup-root.service... May 17 00:35:19.333055 initrd-setup-root[752]: cut: /sysroot/etc/group: No such file or directory May 17 00:35:19.312360 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:35:19.354130 initrd-setup-root[760]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:35:19.364059 initrd-setup-root[770]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:35:19.385782 systemd[1]: Finished initrd-setup-root.service. May 17 00:35:19.420093 kernel: audit: type=1130 audit(1747442119.385:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:19.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:19.387655 systemd[1]: Starting ignition-mount.service... May 17 00:35:19.428350 systemd[1]: Starting sysroot-boot.service... May 17 00:35:19.442751 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 17 00:35:19.442989 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 17 00:35:19.470074 ignition[789]: INFO : Ignition 2.14.0 May 17 00:35:19.470074 ignition[789]: INFO : Stage: mount May 17 00:35:19.470074 ignition[789]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:19.470074 ignition[789]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 17 00:35:19.599827 kernel: audit: type=1130 audit(1747442119.484:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:19.600054 kernel: audit: type=1130 audit(1747442119.511:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:19.600098 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (798) May 17 00:35:19.600134 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:35:19.600170 kernel: BTRFS info (device sda6): using free space tree May 17 00:35:19.600207 kernel: BTRFS info (device sda6): has skinny extents May 17 00:35:19.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:19.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:19.600460 ignition[789]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 17 00:35:19.600460 ignition[789]: INFO : mount: mount passed May 17 00:35:19.600460 ignition[789]: INFO : Ignition finished successfully May 17 00:35:19.648082 kernel: BTRFS info (device sda6): enabling ssd optimizations May 17 00:35:19.472897 systemd[1]: Finished sysroot-boot.service. May 17 00:35:19.486455 systemd[1]: Finished ignition-mount.service. May 17 00:35:19.514957 systemd[1]: Starting ignition-files.service... May 17 00:35:19.670118 ignition[817]: INFO : Ignition 2.14.0 May 17 00:35:19.670118 ignition[817]: INFO : Stage: files May 17 00:35:19.670118 ignition[817]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:19.670118 ignition[817]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 17 00:35:19.670118 ignition[817]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 17 00:35:19.670118 ignition[817]: DEBUG : files: compiled without relabeling support, skipping May 17 00:35:19.670118 ignition[817]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:35:19.670118 ignition[817]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:35:19.554771 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:35:19.773051 ignition[817]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:35:19.773051 ignition[817]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:35:19.773051 ignition[817]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:35:19.773051 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" May 17 00:35:19.773051 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:35:19.773051 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem950401882" May 17 00:35:19.773051 ignition[817]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem950401882": device or resource busy May 17 00:35:19.773051 ignition[817]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem950401882", trying btrfs: device or resource busy May 17 00:35:19.773051 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem950401882" May 17 00:35:19.773051 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem950401882" May 17 00:35:19.773051 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem950401882" May 17 00:35:19.773051 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem950401882" May 17 00:35:19.773051 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" May 17 00:35:19.773051 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" May 17 00:35:19.773051 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(7): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:35:19.773051 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2142134039" May 17 00:35:19.616464 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:35:20.028092 ignition[817]: CRITICAL : files: createFilesystemsFiles: createFiles: op(7): op(8): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2142134039": device or resource busy May 17 00:35:20.028092 ignition[817]: ERROR : files: createFilesystemsFiles: createFiles: op(7): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2142134039", trying btrfs: device or resource busy May 17 00:35:20.028092 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2142134039" May 17 00:35:20.028092 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2142134039" May 17 00:35:20.028092 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [started] unmounting "/mnt/oem2142134039" May 17 00:35:20.028092 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [finished] unmounting "/mnt/oem2142134039" May 17 00:35:20.028092 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" May 17 00:35:20.028092 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" May 17 00:35:20.028092 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:35:20.028092 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:35:20.028092 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:35:20.028092 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:35:20.028092 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:35:20.028092 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" May 17 00:35:19.680888 unknown[817]: wrote ssh authorized keys file for user: core May 17 00:35:20.278096 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:35:20.278096 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4260997110" May 17 00:35:20.278096 ignition[817]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4260997110": device or resource busy May 17 00:35:20.278096 ignition[817]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4260997110", trying btrfs: device or resource busy May 17 00:35:20.278096 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4260997110" May 17 00:35:20.278096 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4260997110" May 17 00:35:20.278096 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem4260997110" May 17 00:35:20.278096 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem4260997110" May 17 00:35:20.278096 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" May 17 00:35:20.278096 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" May 17 00:35:20.278096 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:35:20.278096 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2916200242" May 17 00:35:20.278096 ignition[817]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2916200242": device or resource busy May 17 00:35:20.278096 ignition[817]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2916200242", trying btrfs: device or resource busy May 17 00:35:20.523053 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2916200242" May 17 00:35:20.523053 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2916200242" May 17 00:35:20.523053 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem2916200242" May 17 00:35:20.523053 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem2916200242" May 17 00:35:20.523053 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" May 17 00:35:20.523053 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:35:20.523053 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(16): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 May 17 00:35:20.523053 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(16): GET result: OK May 17 00:35:20.322136 systemd-networkd[673]: eth0: Gained IPv6LL May 17 00:35:20.830042 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:35:20.830042 ignition[817]: INFO : files: op(17): [started] processing unit "oem-gce-enable-oslogin.service" May 17 00:35:20.830042 ignition[817]: INFO : files: op(17): [finished] processing unit "oem-gce-enable-oslogin.service" May 17 00:35:20.830042 ignition[817]: INFO : files: op(18): [started] processing unit "coreos-metadata-sshkeys@.service" May 17 00:35:20.830042 ignition[817]: INFO : files: op(18): [finished] processing unit "coreos-metadata-sshkeys@.service" May 17 00:35:20.967094 kernel: audit: type=1130 audit(1747442120.854:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:20.967170 kernel: audit: type=1130 audit(1747442120.924:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:20.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:20.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:20.967318 ignition[817]: INFO : files: op(19): [started] processing unit "oem-gce.service" May 17 00:35:20.967318 ignition[817]: INFO : files: op(19): [finished] processing unit "oem-gce.service" May 17 00:35:20.967318 ignition[817]: INFO : files: op(1a): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" May 17 00:35:20.967318 ignition[817]: INFO : files: op(1a): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" May 17 00:35:20.967318 ignition[817]: INFO : files: op(1b): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:35:20.967318 ignition[817]: INFO : files: op(1b): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:35:20.967318 ignition[817]: INFO : files: op(1c): [started] setting preset to enabled for "oem-gce.service" May 17 00:35:20.967318 ignition[817]: INFO : files: op(1c): [finished] setting preset to enabled for "oem-gce.service" May 17 00:35:20.967318 ignition[817]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:35:20.967318 ignition[817]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:35:20.967318 ignition[817]: INFO : files: files passed May 17 00:35:20.967318 ignition[817]: INFO : Ignition finished successfully May 17 00:35:21.245215 kernel: audit: type=1130 audit(1747442120.973:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.245261 kernel: audit: type=1131 audit(1747442120.973:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.245278 kernel: audit: type=1130 audit(1747442121.060:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.245294 kernel: audit: type=1131 audit(1747442121.060:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:20.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:20.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:20.839444 systemd[1]: Finished ignition-files.service. May 17 00:35:20.868471 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:35:21.284114 initrd-setup-root-after-ignition[840]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:35:20.896061 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:35:21.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:20.897343 systemd[1]: Starting ignition-quench.service... May 17 00:35:20.908554 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:35:20.926813 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:35:20.927017 systemd[1]: Finished ignition-quench.service. May 17 00:35:20.975409 systemd[1]: Reached target ignition-complete.target. May 17 00:35:21.027690 systemd[1]: Starting initrd-parse-etc.service... May 17 00:35:21.059057 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:35:21.059197 systemd[1]: Finished initrd-parse-etc.service. May 17 00:35:21.062491 systemd[1]: Reached target initrd-fs.target. May 17 00:35:21.141181 systemd[1]: Reached target initrd.target. May 17 00:35:21.161246 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:35:21.162567 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:35:21.194477 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:35:21.218468 systemd[1]: Starting initrd-cleanup.service... May 17 00:35:21.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.241600 systemd[1]: Stopped target nss-lookup.target. May 17 00:35:21.259425 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:35:21.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.274500 systemd[1]: Stopped target timers.target. May 17 00:35:21.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.291562 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:35:21.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.291780 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:35:21.591142 ignition[855]: INFO : Ignition 2.14.0 May 17 00:35:21.591142 ignition[855]: INFO : Stage: umount May 17 00:35:21.591142 ignition[855]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:21.591142 ignition[855]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 17 00:35:21.313662 systemd[1]: Stopped target initrd.target. May 17 00:35:21.655332 ignition[855]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 17 00:35:21.655332 ignition[855]: INFO : umount: umount passed May 17 00:35:21.655332 ignition[855]: INFO : Ignition finished successfully May 17 00:35:21.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.337476 systemd[1]: Stopped target basic.target. May 17 00:35:21.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.351426 systemd[1]: Stopped target ignition-complete.target. May 17 00:35:21.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.367442 systemd[1]: Stopped target ignition-diskful.target. May 17 00:35:21.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.383408 systemd[1]: Stopped target initrd-root-device.target. May 17 00:35:21.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.398428 systemd[1]: Stopped target remote-fs.target. May 17 00:35:21.414400 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:35:21.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.422456 systemd[1]: Stopped target sysinit.target. May 17 00:35:21.437500 systemd[1]: Stopped target local-fs.target. May 17 00:35:21.463457 systemd[1]: Stopped target local-fs-pre.target. May 17 00:35:21.470534 systemd[1]: Stopped target swap.target. May 17 00:35:21.501401 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:35:21.501659 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:35:21.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.508706 systemd[1]: Stopped target cryptsetup.target. May 17 00:35:21.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.530354 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:35:21.530592 systemd[1]: Stopped dracut-initqueue.service. May 17 00:35:21.537581 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:35:21.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.537783 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:35:21.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.561537 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:35:21.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.981000 audit: BPF prog-id=6 op=UNLOAD May 17 00:35:21.561750 systemd[1]: Stopped ignition-files.service. May 17 00:35:21.578073 systemd[1]: Stopping ignition-mount.service... May 17 00:35:21.614534 systemd[1]: Stopping sysroot-boot.service... May 17 00:35:22.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.635847 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:35:22.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.636227 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:35:22.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.669636 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:35:21.669849 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:35:22.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.684890 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:35:21.686334 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:35:21.686474 systemd[1]: Stopped ignition-mount.service. May 17 00:35:22.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.694892 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:35:22.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.695043 systemd[1]: Stopped sysroot-boot.service. May 17 00:35:22.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.715788 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:35:21.715992 systemd[1]: Stopped ignition-disks.service. May 17 00:35:21.730167 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:35:22.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.730261 systemd[1]: Stopped ignition-kargs.service. May 17 00:35:22.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.747203 systemd[1]: ignition-fetch.service: Deactivated successfully. May 17 00:35:22.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.747291 systemd[1]: Stopped ignition-fetch.service. May 17 00:35:22.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.763195 systemd[1]: Stopped target network.target. May 17 00:35:22.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.779084 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:35:21.779218 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:35:21.794215 systemd[1]: Stopped target paths.target. May 17 00:35:21.809080 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:35:22.352707 systemd-journald[190]: Received SIGTERM from PID 1 (n/a). May 17 00:35:21.813012 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:35:22.361127 iscsid[683]: iscsid shutting down. May 17 00:35:21.824075 systemd[1]: Stopped target slices.target. May 17 00:35:21.824236 systemd[1]: Stopped target sockets.target. May 17 00:35:21.845185 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:35:21.845268 systemd[1]: Closed iscsid.socket. May 17 00:35:21.859184 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:35:21.859260 systemd[1]: Closed iscsiuio.socket. May 17 00:35:21.873105 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:35:21.873215 systemd[1]: Stopped ignition-setup.service. May 17 00:35:21.889207 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:35:21.889302 systemd[1]: Stopped initrd-setup-root.service. May 17 00:35:21.904438 systemd[1]: Stopping systemd-networkd.service... May 17 00:35:21.907998 systemd-networkd[673]: eth0: DHCPv6 lease lost May 17 00:35:22.360000 audit: BPF prog-id=9 op=UNLOAD May 17 00:35:21.918432 systemd[1]: Stopping systemd-resolved.service... May 17 00:35:21.934722 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:35:21.934874 systemd[1]: Stopped systemd-resolved.service. May 17 00:35:21.949987 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:35:21.950132 systemd[1]: Stopped systemd-networkd.service. May 17 00:35:21.967932 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:35:21.968067 systemd[1]: Finished initrd-cleanup.service. May 17 00:35:21.984380 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:35:21.984428 systemd[1]: Closed systemd-networkd.socket. May 17 00:35:22.000231 systemd[1]: Stopping network-cleanup.service... May 17 00:35:22.013069 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:35:22.013226 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:35:22.027242 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:35:22.027320 systemd[1]: Stopped systemd-sysctl.service. May 17 00:35:22.042360 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:35:22.042439 systemd[1]: Stopped systemd-modules-load.service. May 17 00:35:22.060361 systemd[1]: Stopping systemd-udevd.service... May 17 00:35:22.076917 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:35:22.077620 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:35:22.077794 systemd[1]: Stopped systemd-udevd.service. May 17 00:35:22.095800 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:35:22.095932 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:35:22.110297 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:35:22.110360 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:35:22.126250 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:35:22.126347 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:35:22.143329 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:35:22.143419 systemd[1]: Stopped dracut-cmdline.service. May 17 00:35:22.158329 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:35:22.158411 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:35:22.175481 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:35:22.199187 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 17 00:35:22.199301 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 17 00:35:22.214421 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:35:22.214491 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:35:22.231347 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:35:22.231428 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:35:22.247822 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 17 00:35:22.248530 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:35:22.248666 systemd[1]: Stopped network-cleanup.service. May 17 00:35:22.262534 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:35:22.262670 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:35:22.278366 systemd[1]: Reached target initrd-switch-root.target. May 17 00:35:22.294338 systemd[1]: Starting initrd-switch-root.service... May 17 00:35:22.318544 systemd[1]: Switching root. May 17 00:35:22.364391 systemd-journald[190]: Journal stopped May 17 00:35:27.233269 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:35:27.233584 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:35:27.233618 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:35:27.233655 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:35:27.233705 kernel: SELinux: policy capability open_perms=1 May 17 00:35:27.233737 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:35:27.233769 kernel: SELinux: policy capability always_check_network=0 May 17 00:35:27.233801 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:35:27.233837 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:35:27.233868 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:35:27.233894 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:35:27.233964 systemd[1]: Successfully loaded SELinux policy in 114.074ms. May 17 00:35:27.234041 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.619ms. May 17 00:35:27.234080 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:35:27.234132 systemd[1]: Detected virtualization kvm. May 17 00:35:27.234168 systemd[1]: Detected architecture x86-64. May 17 00:35:27.234209 systemd[1]: Detected first boot. May 17 00:35:27.234245 systemd[1]: Initializing machine ID from VM UUID. May 17 00:35:27.234270 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:35:27.234298 systemd[1]: Populated /etc with preset unit settings. May 17 00:35:27.234327 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:35:27.234375 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:35:27.234412 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:35:27.234453 kernel: kauditd_printk_skb: 51 callbacks suppressed May 17 00:35:27.234493 kernel: audit: type=1334 audit(1747442126.261:87): prog-id=12 op=LOAD May 17 00:35:27.234524 kernel: audit: type=1334 audit(1747442126.261:88): prog-id=3 op=UNLOAD May 17 00:35:27.234557 kernel: audit: type=1334 audit(1747442126.266:89): prog-id=13 op=LOAD May 17 00:35:27.234589 kernel: audit: type=1334 audit(1747442126.273:90): prog-id=14 op=LOAD May 17 00:35:27.234622 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:35:27.234657 kernel: audit: type=1334 audit(1747442126.273:91): prog-id=4 op=UNLOAD May 17 00:35:27.234688 kernel: audit: type=1334 audit(1747442126.273:92): prog-id=5 op=UNLOAD May 17 00:35:27.234848 kernel: audit: type=1131 audit(1747442126.276:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.234891 systemd[1]: Stopped iscsiuio.service. May 17 00:35:27.234967 kernel: audit: type=1334 audit(1747442126.342:94): prog-id=12 op=UNLOAD May 17 00:35:27.234996 kernel: audit: type=1131 audit(1747442126.356:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.235022 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:35:27.235052 systemd[1]: Stopped iscsid.service. May 17 00:35:27.235082 kernel: audit: type=1131 audit(1747442126.396:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.235108 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:35:27.235135 systemd[1]: Stopped initrd-switch-root.service. May 17 00:35:27.235185 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:35:27.235244 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:35:27.235275 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:35:27.235309 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 17 00:35:27.235344 systemd[1]: Created slice system-getty.slice. May 17 00:35:27.235376 systemd[1]: Created slice system-modprobe.slice. May 17 00:35:27.235407 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:35:27.235444 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:35:27.235475 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:35:27.235522 systemd[1]: Created slice user.slice. May 17 00:35:27.235554 systemd[1]: Started systemd-ask-password-console.path. May 17 00:35:27.235586 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:35:27.235618 systemd[1]: Set up automount boot.automount. May 17 00:35:27.235651 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:35:27.235680 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:35:27.235707 systemd[1]: Stopped target initrd-fs.target. May 17 00:35:27.235735 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:35:27.235759 systemd[1]: Reached target integritysetup.target. May 17 00:35:27.235787 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:35:27.235818 systemd[1]: Reached target remote-fs.target. May 17 00:35:27.235846 systemd[1]: Reached target slices.target. May 17 00:35:27.235875 systemd[1]: Reached target swap.target. May 17 00:35:27.235920 systemd[1]: Reached target torcx.target. May 17 00:35:27.235946 systemd[1]: Reached target veritysetup.target. May 17 00:35:27.235970 systemd[1]: Listening on systemd-coredump.socket. May 17 00:35:27.235996 systemd[1]: Listening on systemd-initctl.socket. May 17 00:35:27.236031 systemd[1]: Listening on systemd-networkd.socket. May 17 00:35:27.236055 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:35:27.236080 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:35:27.236109 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:35:27.236133 systemd[1]: Mounting dev-hugepages.mount... May 17 00:35:27.236158 systemd[1]: Mounting dev-mqueue.mount... May 17 00:35:27.236183 systemd[1]: Mounting media.mount... May 17 00:35:27.236214 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:35:27.236239 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:35:27.236269 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:35:27.236297 systemd[1]: Mounting tmp.mount... May 17 00:35:27.236324 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:35:27.236349 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:35:27.236384 systemd[1]: Starting kmod-static-nodes.service... May 17 00:35:27.236413 systemd[1]: Starting modprobe@configfs.service... May 17 00:35:27.236438 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:35:27.236463 systemd[1]: Starting modprobe@drm.service... May 17 00:35:27.236490 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:35:27.236522 systemd[1]: Starting modprobe@fuse.service... May 17 00:35:27.236547 systemd[1]: Starting modprobe@loop.service... May 17 00:35:27.236580 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:35:27.236606 kernel: fuse: init (API version 7.34) May 17 00:35:27.236630 kernel: loop: module loaded May 17 00:35:27.236657 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:35:27.236685 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:35:27.236712 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:35:27.236738 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:35:27.236767 systemd[1]: Stopped systemd-journald.service. May 17 00:35:27.236792 systemd[1]: Starting systemd-journald.service... May 17 00:35:27.236819 systemd[1]: Starting systemd-modules-load.service... May 17 00:35:27.236845 systemd[1]: Starting systemd-network-generator.service... May 17 00:35:27.236877 systemd-journald[979]: Journal started May 17 00:35:27.241350 systemd-journald[979]: Runtime Journal (/run/log/journal/a513fb72616d75140cd4c382b968345a) is 8.0M, max 148.8M, 140.8M free. May 17 00:35:27.241458 systemd[1]: Starting systemd-remount-fs.service... May 17 00:35:22.656000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:35:22.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:35:22.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:35:22.803000 audit: BPF prog-id=10 op=LOAD May 17 00:35:22.803000 audit: BPF prog-id=10 op=UNLOAD May 17 00:35:22.804000 audit: BPF prog-id=11 op=LOAD May 17 00:35:22.804000 audit: BPF prog-id=11 op=UNLOAD May 17 00:35:22.967000 audit[888]: AVC avc: denied { associate } for pid=888 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:35:22.967000 audit[888]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=871 pid=888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:22.967000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:35:22.978000 audit[888]: AVC avc: denied { associate } for pid=888 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:35:22.978000 audit[888]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179a9 a2=1ed a3=0 items=2 ppid=871 pid=888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:22.978000 audit: CWD cwd="/" May 17 00:35:22.978000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:22.978000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:22.978000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:35:26.261000 audit: BPF prog-id=12 op=LOAD May 17 00:35:26.261000 audit: BPF prog-id=3 op=UNLOAD May 17 00:35:26.266000 audit: BPF prog-id=13 op=LOAD May 17 00:35:26.273000 audit: BPF prog-id=14 op=LOAD May 17 00:35:26.273000 audit: BPF prog-id=4 op=UNLOAD May 17 00:35:26.273000 audit: BPF prog-id=5 op=UNLOAD May 17 00:35:26.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:26.342000 audit: BPF prog-id=12 op=UNLOAD May 17 00:35:26.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:26.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:26.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:26.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.170000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.185000 audit: BPF prog-id=15 op=LOAD May 17 00:35:27.185000 audit: BPF prog-id=16 op=LOAD May 17 00:35:27.185000 audit: BPF prog-id=17 op=LOAD May 17 00:35:27.185000 audit: BPF prog-id=13 op=UNLOAD May 17 00:35:27.185000 audit: BPF prog-id=14 op=UNLOAD May 17 00:35:27.228000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:35:27.228000 audit[979]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fff073bbb80 a2=4000 a3=7fff073bbc1c items=0 ppid=1 pid=979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:27.228000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:35:22.963775 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2025-05-17T00:35:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:35:26.259311 systemd[1]: Queued start job for default target multi-user.target. May 17 00:35:22.964675 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2025-05-17T00:35:22Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:35:26.259327 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 17 00:35:22.964700 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2025-05-17T00:35:22Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:35:26.277436 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:35:22.964741 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2025-05-17T00:35:22Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:35:22.964753 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2025-05-17T00:35:22Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:35:22.964794 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2025-05-17T00:35:22Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:35:22.964810 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2025-05-17T00:35:22Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:35:22.965147 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2025-05-17T00:35:22Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:35:22.965218 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2025-05-17T00:35:22Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:35:22.965242 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2025-05-17T00:35:22Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:35:22.967137 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2025-05-17T00:35:22Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:35:22.967321 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2025-05-17T00:35:22Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:35:22.968194 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2025-05-17T00:35:22Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:35:22.968233 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2025-05-17T00:35:22Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:35:22.968275 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2025-05-17T00:35:22Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:35:22.968307 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2025-05-17T00:35:22Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:35:25.593870 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2025-05-17T00:35:25Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:35:25.594358 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2025-05-17T00:35:25Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:35:25.594634 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2025-05-17T00:35:25Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:35:25.595135 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2025-05-17T00:35:25Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:35:25.595649 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2025-05-17T00:35:25Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:35:25.595937 /usr/lib/systemd/system-generators/torcx-generator[888]: time="2025-05-17T00:35:25Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:35:27.260987 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:35:27.273942 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:35:27.279956 systemd[1]: Stopped verity-setup.service. May 17 00:35:27.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.299941 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:35:27.309966 systemd[1]: Started systemd-journald.service. May 17 00:35:27.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.319677 systemd[1]: Mounted dev-hugepages.mount. May 17 00:35:27.327310 systemd[1]: Mounted dev-mqueue.mount. May 17 00:35:27.334283 systemd[1]: Mounted media.mount. May 17 00:35:27.341270 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:35:27.350261 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:35:27.359242 systemd[1]: Mounted tmp.mount. May 17 00:35:27.366572 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:35:27.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.375547 systemd[1]: Finished kmod-static-nodes.service. May 17 00:35:27.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.384464 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:35:27.384702 systemd[1]: Finished modprobe@configfs.service. May 17 00:35:27.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.393561 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:35:27.393799 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:35:27.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.402683 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:35:27.402970 systemd[1]: Finished modprobe@drm.service. May 17 00:35:27.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.411543 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:35:27.411780 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:35:27.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.420510 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:35:27.420735 systemd[1]: Finished modprobe@fuse.service. May 17 00:35:27.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.429502 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:35:27.429733 systemd[1]: Finished modprobe@loop.service. May 17 00:35:27.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.438540 systemd[1]: Finished systemd-modules-load.service. May 17 00:35:27.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.447567 systemd[1]: Finished systemd-network-generator.service. May 17 00:35:27.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.457535 systemd[1]: Finished systemd-remount-fs.service. May 17 00:35:27.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.466556 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:35:27.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.476994 systemd[1]: Reached target network-pre.target. May 17 00:35:27.486720 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:35:27.496567 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:35:27.504077 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:35:27.507207 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:35:27.516285 systemd[1]: Starting systemd-journal-flush.service... May 17 00:35:27.526093 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:35:27.528014 systemd[1]: Starting systemd-random-seed.service... May 17 00:35:27.538312 systemd-journald[979]: Time spent on flushing to /var/log/journal/a513fb72616d75140cd4c382b968345a is 46.587ms for 1133 entries. May 17 00:35:27.538312 systemd-journald[979]: System Journal (/var/log/journal/a513fb72616d75140cd4c382b968345a) is 8.0M, max 584.8M, 576.8M free. May 17 00:35:27.638247 systemd-journald[979]: Received client request to flush runtime journal. May 17 00:35:27.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.536115 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:35:27.537985 systemd[1]: Starting systemd-sysctl.service... May 17 00:35:27.556127 systemd[1]: Starting systemd-sysusers.service... May 17 00:35:27.566017 systemd[1]: Starting systemd-udev-settle.service... May 17 00:35:27.578088 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:35:27.585828 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:35:27.595512 systemd[1]: Finished systemd-random-seed.service. May 17 00:35:27.605532 systemd[1]: Finished systemd-sysctl.service. May 17 00:35:27.618812 systemd[1]: Reached target first-boot-complete.target. May 17 00:35:27.628697 systemd[1]: Finished systemd-sysusers.service. May 17 00:35:27.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.640828 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:35:27.652562 systemd[1]: Finished systemd-journal-flush.service. May 17 00:35:27.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.663987 udevadm[993]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 17 00:35:27.710556 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:35:27.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:28.283835 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:35:28.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:28.291000 audit: BPF prog-id=18 op=LOAD May 17 00:35:28.291000 audit: BPF prog-id=19 op=LOAD May 17 00:35:28.291000 audit: BPF prog-id=7 op=UNLOAD May 17 00:35:28.291000 audit: BPF prog-id=8 op=UNLOAD May 17 00:35:28.294129 systemd[1]: Starting systemd-udevd.service... May 17 00:35:28.319560 systemd-udevd[999]: Using default interface naming scheme 'v252'. May 17 00:35:28.371383 systemd[1]: Started systemd-udevd.service. May 17 00:35:28.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:28.381000 audit: BPF prog-id=20 op=LOAD May 17 00:35:28.384638 systemd[1]: Starting systemd-networkd.service... May 17 00:35:28.398000 audit: BPF prog-id=21 op=LOAD May 17 00:35:28.398000 audit: BPF prog-id=22 op=LOAD May 17 00:35:28.398000 audit: BPF prog-id=23 op=LOAD May 17 00:35:28.401843 systemd[1]: Starting systemd-userdbd.service... May 17 00:35:28.471156 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 17 00:35:28.477907 systemd[1]: Started systemd-userdbd.service. May 17 00:35:28.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:28.637324 systemd-networkd[1013]: lo: Link UP May 17 00:35:28.637341 systemd-networkd[1013]: lo: Gained carrier May 17 00:35:28.638323 systemd-networkd[1013]: Enumeration completed May 17 00:35:28.638495 systemd[1]: Started systemd-networkd.service. May 17 00:35:28.641623 systemd-networkd[1013]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:35:28.644198 systemd-networkd[1013]: eth0: Link UP May 17 00:35:28.644460 systemd-networkd[1013]: eth0: Gained carrier May 17 00:35:28.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:28.651760 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:35:28.658178 systemd-networkd[1013]: eth0: Overlong DHCP hostname received, shortened from 'ci-3510-3-7-nightly-20250516-2100-4d93bffd9d88d2951645.c.flatcar-212911.internal' to 'ci-3510-3-7-nightly-20250516-2100-4d93bffd9d88d2951645' May 17 00:35:28.658216 systemd-networkd[1013]: eth0: DHCPv4 address 10.128.0.12/32, gateway 10.128.0.1 acquired from 169.254.169.254 May 17 00:35:28.693967 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 17 00:35:28.693000 audit[1009]: AVC avc: denied { confidentiality } for pid=1009 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:35:28.705943 kernel: ACPI: button: Power Button [PWRF] May 17 00:35:28.693000 audit[1009]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558bac612b40 a1=338ac a2=7f568899ebc5 a3=5 items=110 ppid=999 pid=1009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:28.693000 audit: CWD cwd="/" May 17 00:35:28.693000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=1 name=(null) inode=12995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=2 name=(null) inode=12995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=3 name=(null) inode=12996 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=4 name=(null) inode=12995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=5 name=(null) inode=12997 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=6 name=(null) inode=12995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=7 name=(null) inode=12998 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=8 name=(null) inode=12998 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=9 name=(null) inode=12999 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=10 name=(null) inode=12998 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=11 name=(null) inode=13000 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=12 name=(null) inode=12998 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=13 name=(null) inode=13001 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=14 name=(null) inode=12998 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=15 name=(null) inode=13002 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=16 name=(null) inode=12998 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=17 name=(null) inode=13003 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=18 name=(null) inode=12995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=19 name=(null) inode=13004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=20 name=(null) inode=13004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=21 name=(null) inode=13005 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=22 name=(null) inode=13004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=23 name=(null) inode=13006 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=24 name=(null) inode=13004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=25 name=(null) inode=13007 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=26 name=(null) inode=13004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=27 name=(null) inode=13008 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=28 name=(null) inode=13004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=29 name=(null) inode=13009 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=30 name=(null) inode=12995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=31 name=(null) inode=13010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=32 name=(null) inode=13010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=33 name=(null) inode=13011 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=34 name=(null) inode=13010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=35 name=(null) inode=13012 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=36 name=(null) inode=13010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=37 name=(null) inode=13013 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=38 name=(null) inode=13010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=39 name=(null) inode=13014 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=40 name=(null) inode=13010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=41 name=(null) inode=13015 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=42 name=(null) inode=12995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=43 name=(null) inode=13016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=44 name=(null) inode=13016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=45 name=(null) inode=13017 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=46 name=(null) inode=13016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=47 name=(null) inode=13018 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=48 name=(null) inode=13016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=49 name=(null) inode=13019 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=50 name=(null) inode=13016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=51 name=(null) inode=13020 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=52 name=(null) inode=13016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=53 name=(null) inode=13021 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=55 name=(null) inode=13022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=56 name=(null) inode=13022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=57 name=(null) inode=13023 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=58 name=(null) inode=13022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=59 name=(null) inode=13024 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=60 name=(null) inode=13022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=61 name=(null) inode=13025 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=62 name=(null) inode=13025 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=63 name=(null) inode=13026 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=64 name=(null) inode=13025 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=65 name=(null) inode=13027 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=66 name=(null) inode=13025 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=67 name=(null) inode=13028 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=68 name=(null) inode=13025 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=69 name=(null) inode=13029 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=70 name=(null) inode=13025 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=71 name=(null) inode=13030 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=72 name=(null) inode=13022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=73 name=(null) inode=13031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=74 name=(null) inode=13031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=75 name=(null) inode=13032 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=76 name=(null) inode=13031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=77 name=(null) inode=13033 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=78 name=(null) inode=13031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=79 name=(null) inode=13034 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=80 name=(null) inode=13031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=81 name=(null) inode=13035 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=82 name=(null) inode=13031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=83 name=(null) inode=13036 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=84 name=(null) inode=13022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=85 name=(null) inode=13037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=86 name=(null) inode=13037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=87 name=(null) inode=13038 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=88 name=(null) inode=13037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=89 name=(null) inode=13039 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=90 name=(null) inode=13037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=91 name=(null) inode=13040 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=92 name=(null) inode=13037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=93 name=(null) inode=13041 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=94 name=(null) inode=13037 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=95 name=(null) inode=13042 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=96 name=(null) inode=13022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=97 name=(null) inode=13043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=98 name=(null) inode=13043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=99 name=(null) inode=13044 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=100 name=(null) inode=13043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=101 name=(null) inode=13045 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=102 name=(null) inode=13043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=103 name=(null) inode=13046 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=104 name=(null) inode=13043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=105 name=(null) inode=13047 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=106 name=(null) inode=13043 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=107 name=(null) inode=13048 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PATH item=109 name=(null) inode=13049 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:28.693000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:35:28.758978 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr May 17 00:35:28.770943 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 17 00:35:28.771062 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 May 17 00:35:28.801344 kernel: EDAC MC: Ver: 3.0.0 May 17 00:35:28.801486 kernel: ACPI: button: Sleep Button [SLPF] May 17 00:35:28.832939 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:35:28.864479 systemd[1]: Finished systemd-udev-settle.service. May 17 00:35:28.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:28.874979 systemd[1]: Starting lvm2-activation-early.service... May 17 00:35:28.905506 lvm[1037]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:35:28.938471 systemd[1]: Finished lvm2-activation-early.service. May 17 00:35:28.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:28.947329 systemd[1]: Reached target cryptsetup.target. May 17 00:35:28.957838 systemd[1]: Starting lvm2-activation.service... May 17 00:35:28.964653 lvm[1038]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:35:28.995485 systemd[1]: Finished lvm2-activation.service. May 17 00:35:29.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:29.004317 systemd[1]: Reached target local-fs-pre.target. May 17 00:35:29.013096 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:35:29.013170 systemd[1]: Reached target local-fs.target. May 17 00:35:29.022102 systemd[1]: Reached target machines.target. May 17 00:35:29.031875 systemd[1]: Starting ldconfig.service... May 17 00:35:29.040231 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:35:29.040342 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:35:29.042313 systemd[1]: Starting systemd-boot-update.service... May 17 00:35:29.050867 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:35:29.063335 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:35:29.065804 systemd[1]: Starting systemd-sysext.service... May 17 00:35:29.066638 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1040 (bootctl) May 17 00:35:29.069402 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:35:29.095733 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:35:29.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:29.111005 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:35:29.119016 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:35:29.119338 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:35:29.146937 kernel: loop0: detected capacity change from 0 to 224512 May 17 00:35:29.254187 systemd-fsck[1050]: fsck.fat 4.2 (2021-01-31) May 17 00:35:29.254187 systemd-fsck[1050]: /dev/sda1: 790 files, 120726/258078 clusters May 17 00:35:29.259060 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:35:29.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:29.271615 systemd[1]: Mounting boot.mount... May 17 00:35:29.313836 systemd[1]: Mounted boot.mount. May 17 00:35:29.344736 systemd[1]: Finished systemd-boot-update.service. May 17 00:35:29.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:29.420633 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:35:29.478921 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:35:29.481692 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:35:29.491955 kernel: loop1: detected capacity change from 0 to 224512 May 17 00:35:29.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:29.515361 (sd-sysext)[1056]: Using extensions 'kubernetes'. May 17 00:35:29.516982 (sd-sysext)[1056]: Merged extensions into '/usr'. May 17 00:35:29.548040 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:35:29.550403 systemd[1]: Mounting usr-share-oem.mount... May 17 00:35:29.557620 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:35:29.559820 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:35:29.568993 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:35:29.578131 systemd[1]: Starting modprobe@loop.service... May 17 00:35:29.585150 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:35:29.585456 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:35:29.585714 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:35:29.590803 systemd[1]: Mounted usr-share-oem.mount. May 17 00:35:29.598687 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:35:29.598987 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:35:29.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:29.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:29.608010 systemd[1]: Finished systemd-sysext.service. May 17 00:35:29.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:29.616669 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:35:29.616986 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:35:29.626553 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:35:29.626813 systemd[1]: Finished modprobe@loop.service. May 17 00:35:29.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:29.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:29.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:29.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:29.639524 systemd[1]: Starting ensure-sysext.service... May 17 00:35:29.647142 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:35:29.647274 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:35:29.649682 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:35:29.662507 systemd[1]: Reloading. May 17 00:35:29.682439 systemd-tmpfiles[1063]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:35:29.685363 systemd-tmpfiles[1063]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:35:29.693170 systemd-tmpfiles[1063]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:35:29.758864 ldconfig[1039]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:35:29.802431 /usr/lib/systemd/system-generators/torcx-generator[1083]: time="2025-05-17T00:35:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:35:29.804182 /usr/lib/systemd/system-generators/torcx-generator[1083]: time="2025-05-17T00:35:29Z" level=info msg="torcx already run" May 17 00:35:30.004396 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:35:30.004430 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:35:30.029457 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:35:30.107000 audit: BPF prog-id=24 op=LOAD May 17 00:35:30.107000 audit: BPF prog-id=25 op=LOAD May 17 00:35:30.107000 audit: BPF prog-id=18 op=UNLOAD May 17 00:35:30.107000 audit: BPF prog-id=19 op=UNLOAD May 17 00:35:30.108000 audit: BPF prog-id=26 op=LOAD May 17 00:35:30.108000 audit: BPF prog-id=21 op=UNLOAD May 17 00:35:30.108000 audit: BPF prog-id=27 op=LOAD May 17 00:35:30.108000 audit: BPF prog-id=28 op=LOAD May 17 00:35:30.109000 audit: BPF prog-id=22 op=UNLOAD May 17 00:35:30.109000 audit: BPF prog-id=23 op=UNLOAD May 17 00:35:30.114101 systemd-networkd[1013]: eth0: Gained IPv6LL May 17 00:35:30.115000 audit: BPF prog-id=29 op=LOAD May 17 00:35:30.115000 audit: BPF prog-id=20 op=UNLOAD May 17 00:35:30.117000 audit: BPF prog-id=30 op=LOAD May 17 00:35:30.117000 audit: BPF prog-id=15 op=UNLOAD May 17 00:35:30.117000 audit: BPF prog-id=31 op=LOAD May 17 00:35:30.117000 audit: BPF prog-id=32 op=LOAD May 17 00:35:30.117000 audit: BPF prog-id=16 op=UNLOAD May 17 00:35:30.117000 audit: BPF prog-id=17 op=UNLOAD May 17 00:35:30.125981 systemd[1]: Finished ldconfig.service. May 17 00:35:30.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:30.135067 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:35:30.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:30.151041 systemd[1]: Starting audit-rules.service... May 17 00:35:30.160381 systemd[1]: Starting clean-ca-certificates.service... May 17 00:35:30.172073 systemd[1]: Starting oem-gce-enable-oslogin.service... May 17 00:35:30.183077 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:35:30.191000 audit: BPF prog-id=33 op=LOAD May 17 00:35:30.195843 systemd[1]: Starting systemd-resolved.service... May 17 00:35:30.202000 audit: BPF prog-id=34 op=LOAD May 17 00:35:30.206935 systemd[1]: Starting systemd-timesyncd.service... May 17 00:35:30.216842 systemd[1]: Starting systemd-update-utmp.service... May 17 00:35:30.226760 systemd[1]: Finished clean-ca-certificates.service. May 17 00:35:30.225000 audit[1151]: SYSTEM_BOOT pid=1151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:35:30.236947 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. May 17 00:35:30.237251 systemd[1]: Finished oem-gce-enable-oslogin.service. May 17 00:35:30.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:30.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:30.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:30.255449 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:35:30.256145 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:35:30.259249 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:35:30.259000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:35:30.259000 audit[1157]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd7cd83f20 a2=420 a3=0 items=0 ppid=1127 pid=1157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:30.259000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:35:30.262076 augenrules[1157]: No rules May 17 00:35:30.269767 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:35:30.279693 systemd[1]: Starting modprobe@loop.service... May 17 00:35:30.289372 systemd[1]: Starting oem-gce-enable-oslogin.service... May 17 00:35:30.296418 enable-oslogin[1165]: /etc/pam.d/sshd already exists. Not enabling OS Login May 17 00:35:30.298146 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:35:30.298546 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:35:30.298890 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:35:30.299248 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:35:30.303652 systemd[1]: Finished audit-rules.service. May 17 00:35:30.312224 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:35:30.323288 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:35:30.323576 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:35:30.333253 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:35:30.333521 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:35:30.343230 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:35:30.343482 systemd[1]: Finished modprobe@loop.service. May 17 00:35:30.354415 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. May 17 00:35:30.354717 systemd[1]: Finished oem-gce-enable-oslogin.service. May 17 00:35:30.364377 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:35:30.364791 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:35:30.368070 systemd[1]: Starting systemd-update-done.service... May 17 00:35:30.376422 systemd[1]: Finished systemd-update-utmp.service. May 17 00:35:30.389269 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:35:30.390060 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:35:30.395644 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:35:30.405597 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:35:30.407893 systemd-resolved[1142]: Positive Trust Anchors: May 17 00:35:30.408414 systemd-resolved[1142]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:35:30.408625 systemd-resolved[1142]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:35:30.415600 systemd[1]: Starting modprobe@loop.service... May 17 00:35:30.418384 systemd-timesyncd[1147]: Contacted time server 169.254.169.254:123 (169.254.169.254). May 17 00:35:30.419050 systemd-timesyncd[1147]: Initial clock synchronization to Sat 2025-05-17 00:35:30.617153 UTC. May 17 00:35:30.425320 systemd[1]: Starting oem-gce-enable-oslogin.service... May 17 00:35:30.430601 enable-oslogin[1171]: /etc/pam.d/sshd already exists. Not enabling OS Login May 17 00:35:30.434155 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:35:30.434512 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:35:30.434803 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:35:30.435046 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:35:30.437577 systemd[1]: Started systemd-timesyncd.service. May 17 00:35:30.448560 systemd[1]: Finished systemd-update-done.service. May 17 00:35:30.454573 systemd-resolved[1142]: Defaulting to hostname 'linux'. May 17 00:35:30.457566 systemd[1]: Started systemd-resolved.service. May 17 00:35:30.466803 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:35:30.467117 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:35:30.476826 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:35:30.477114 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:35:30.486874 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:35:30.487152 systemd[1]: Finished modprobe@loop.service. May 17 00:35:30.496800 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. May 17 00:35:30.497133 systemd[1]: Finished oem-gce-enable-oslogin.service. May 17 00:35:30.507020 systemd[1]: Reached target network.target. May 17 00:35:30.515294 systemd[1]: Reached target nss-lookup.target. May 17 00:35:30.524272 systemd[1]: Reached target time-set.target. May 17 00:35:30.533260 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:35:30.533583 systemd[1]: Reached target sysinit.target. May 17 00:35:30.542445 systemd[1]: Started motdgen.path. May 17 00:35:30.549395 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:35:30.559639 systemd[1]: Started logrotate.timer. May 17 00:35:30.567493 systemd[1]: Started mdadm.timer. May 17 00:35:30.575391 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:35:30.584270 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:35:30.584520 systemd[1]: Reached target paths.target. May 17 00:35:30.592290 systemd[1]: Reached target timers.target. May 17 00:35:30.600228 systemd[1]: Listening on dbus.socket. May 17 00:35:30.609160 systemd[1]: Starting docker.socket... May 17 00:35:30.620767 systemd[1]: Listening on sshd.socket. May 17 00:35:30.628405 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:35:30.628729 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:35:30.632035 systemd[1]: Listening on docker.socket. May 17 00:35:30.642273 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:35:30.642516 systemd[1]: Reached target sockets.target. May 17 00:35:30.651291 systemd[1]: Reached target basic.target. May 17 00:35:30.658292 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:35:30.658648 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:35:30.661112 systemd[1]: Starting containerd.service... May 17 00:35:30.670557 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 17 00:35:30.682310 systemd[1]: Starting dbus.service... May 17 00:35:30.690308 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:35:30.699917 systemd[1]: Starting extend-filesystems.service... May 17 00:35:30.719173 jq[1177]: false May 17 00:35:30.707079 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:35:30.710123 systemd[1]: Starting modprobe@drm.service... May 17 00:35:30.719526 systemd[1]: Starting motdgen.service... May 17 00:35:30.729655 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:35:30.739466 systemd[1]: Starting sshd-keygen.service... May 17 00:35:30.750536 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:35:30.759096 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:35:30.759425 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). May 17 00:35:30.760395 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:35:30.762204 systemd[1]: Starting update-engine.service... May 17 00:35:30.772807 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:35:30.779866 jq[1195]: true May 17 00:35:30.787765 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:35:30.790138 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:35:30.791249 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:35:30.791497 systemd[1]: Finished modprobe@drm.service. May 17 00:35:30.801081 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:35:30.801377 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:35:30.811040 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:35:30.822104 extend-filesystems[1178]: Found loop1 May 17 00:35:30.822104 extend-filesystems[1178]: Found sda May 17 00:35:30.822104 extend-filesystems[1178]: Found sda1 May 17 00:35:30.822104 extend-filesystems[1178]: Found sda2 May 17 00:35:30.822104 extend-filesystems[1178]: Found sda3 May 17 00:35:30.822104 extend-filesystems[1178]: Found usr May 17 00:35:30.822104 extend-filesystems[1178]: Found sda4 May 17 00:35:30.822104 extend-filesystems[1178]: Found sda6 May 17 00:35:30.822104 extend-filesystems[1178]: Found sda7 May 17 00:35:30.822104 extend-filesystems[1178]: Found sda9 May 17 00:35:30.822104 extend-filesystems[1178]: Checking size of /dev/sda9 May 17 00:35:30.943318 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks May 17 00:35:30.942063 dbus-daemon[1176]: [system] SELinux support is enabled May 17 00:35:30.943888 update_engine[1192]: I0517 00:35:30.911006 1192 main.cc:92] Flatcar Update Engine starting May 17 00:35:30.823085 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:35:30.944461 extend-filesystems[1178]: Resized partition /dev/sda9 May 17 00:35:30.959297 jq[1203]: true May 17 00:35:30.823364 systemd[1]: Finished motdgen.service. May 17 00:35:30.959934 update_engine[1192]: I0517 00:35:30.953402 1192 update_check_scheduler.cc:74] Next update check in 4m8s May 17 00:35:30.960016 extend-filesystems[1214]: resize2fs 1.46.5 (30-Dec-2021) May 17 00:35:30.947636 dbus-daemon[1176]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1013 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") May 17 00:35:30.846083 systemd[1]: Reached target network-online.target. May 17 00:35:30.863532 systemd[1]: Starting kubelet.service... May 17 00:35:30.889620 systemd[1]: Starting oem-gce.service... May 17 00:35:30.917868 systemd[1]: Starting systemd-logind.service... May 17 00:35:30.934963 systemd[1]: Finished ensure-sysext.service. May 17 00:35:30.951388 systemd[1]: Started dbus.service. May 17 00:35:30.979989 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:35:30.980075 systemd[1]: Reached target system-config.target. May 17 00:35:30.982217 dbus-daemon[1176]: [system] Successfully activated service 'org.freedesktop.systemd1' May 17 00:35:30.990948 kernel: EXT4-fs (sda9): resized filesystem to 2538491 May 17 00:35:30.993539 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:35:30.993597 systemd[1]: Reached target user-config.target. May 17 00:35:31.002400 systemd[1]: Started update-engine.service. May 17 00:35:31.021789 systemd[1]: Started locksmithd.service. May 17 00:35:31.028569 extend-filesystems[1214]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required May 17 00:35:31.028569 extend-filesystems[1214]: old_desc_blocks = 1, new_desc_blocks = 2 May 17 00:35:31.028569 extend-filesystems[1214]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. May 17 00:35:31.068318 extend-filesystems[1178]: Resized filesystem in /dev/sda9 May 17 00:35:31.033080 systemd[1]: Starting systemd-hostnamed.service... May 17 00:35:31.086608 env[1204]: time="2025-05-17T00:35:31.082508016Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:35:31.058052 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:35:31.058386 systemd[1]: Finished extend-filesystems.service. May 17 00:35:31.090078 mkfs.ext4[1238]: mke2fs 1.46.5 (30-Dec-2021) May 17 00:35:31.096090 mkfs.ext4[1238]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done May 17 00:35:31.096299 mkfs.ext4[1238]: Creating filesystem with 262144 4k blocks and 65536 inodes May 17 00:35:31.096398 mkfs.ext4[1238]: Filesystem UUID: be1fe7c3-9ad9-4861-9499-80cff465ce4d May 17 00:35:31.096557 mkfs.ext4[1238]: Superblock backups stored on blocks: May 17 00:35:31.096940 mkfs.ext4[1238]: 32768, 98304, 163840, 229376 May 17 00:35:31.097317 mkfs.ext4[1238]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done May 17 00:35:31.097635 mkfs.ext4[1238]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done May 17 00:35:31.103896 mkfs.ext4[1238]: Creating journal (8192 blocks): done May 17 00:35:31.115891 mkfs.ext4[1238]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done May 17 00:35:31.126209 bash[1239]: Updated "/home/core/.ssh/authorized_keys" May 17 00:35:31.128112 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:35:31.163966 umount[1243]: umount: /var/lib/flatcar-oem-gce.img: not mounted. May 17 00:35:31.215964 kernel: loop2: detected capacity change from 0 to 2097152 May 17 00:35:31.298999 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:35:31.339730 systemd-logind[1215]: Watching system buttons on /dev/input/event1 (Power Button) May 17 00:35:31.339795 systemd-logind[1215]: Watching system buttons on /dev/input/event3 (Sleep Button) May 17 00:35:31.339835 systemd-logind[1215]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 17 00:35:31.341534 systemd-logind[1215]: New seat seat0. May 17 00:35:31.343859 coreos-metadata[1175]: May 17 00:35:31.343 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 May 17 00:35:31.352410 systemd[1]: Started systemd-logind.service. May 17 00:35:31.358378 coreos-metadata[1175]: May 17 00:35:31.358 INFO Fetch failed with 404: resource not found May 17 00:35:31.358541 coreos-metadata[1175]: May 17 00:35:31.358 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 May 17 00:35:31.370841 coreos-metadata[1175]: May 17 00:35:31.370 INFO Fetch successful May 17 00:35:31.370841 coreos-metadata[1175]: May 17 00:35:31.370 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 May 17 00:35:31.373094 coreos-metadata[1175]: May 17 00:35:31.373 INFO Fetch failed with 404: resource not found May 17 00:35:31.373094 coreos-metadata[1175]: May 17 00:35:31.373 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 May 17 00:35:31.374867 coreos-metadata[1175]: May 17 00:35:31.374 INFO Fetch failed with 404: resource not found May 17 00:35:31.374867 coreos-metadata[1175]: May 17 00:35:31.374 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 May 17 00:35:31.375250 coreos-metadata[1175]: May 17 00:35:31.375 INFO Fetch successful May 17 00:35:31.405891 dbus-daemon[1176]: [system] Successfully activated service 'org.freedesktop.hostname1' May 17 00:35:31.409126 dbus-daemon[1176]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1230 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") May 17 00:35:31.406539 systemd[1]: Started systemd-hostnamed.service. May 17 00:35:31.416606 unknown[1175]: wrote ssh authorized keys file for user: core May 17 00:35:31.421254 systemd[1]: Starting polkit.service... May 17 00:35:31.427245 env[1204]: time="2025-05-17T00:35:31.426755926Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:35:31.427245 env[1204]: time="2025-05-17T00:35:31.427089201Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:35:31.450444 update-ssh-keys[1252]: Updated "/home/core/.ssh/authorized_keys" May 17 00:35:31.451346 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 17 00:35:31.454765 env[1204]: time="2025-05-17T00:35:31.454686800Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:35:31.454903 env[1204]: time="2025-05-17T00:35:31.454765893Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:35:31.455227 env[1204]: time="2025-05-17T00:35:31.455183029Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:35:31.455339 env[1204]: time="2025-05-17T00:35:31.455230036Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:35:31.455339 env[1204]: time="2025-05-17T00:35:31.455259449Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:35:31.455339 env[1204]: time="2025-05-17T00:35:31.455280969Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:35:31.455528 env[1204]: time="2025-05-17T00:35:31.455416277Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:35:31.455966 env[1204]: time="2025-05-17T00:35:31.455798290Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:35:31.456208 env[1204]: time="2025-05-17T00:35:31.456167723Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:35:31.456301 env[1204]: time="2025-05-17T00:35:31.456211708Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:35:31.456363 env[1204]: time="2025-05-17T00:35:31.456307327Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:35:31.456363 env[1204]: time="2025-05-17T00:35:31.456330600Z" level=info msg="metadata content store policy set" policy=shared May 17 00:35:31.486402 env[1204]: time="2025-05-17T00:35:31.486322181Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:35:31.486402 env[1204]: time="2025-05-17T00:35:31.486403919Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:35:31.486654 env[1204]: time="2025-05-17T00:35:31.486429705Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:35:31.486654 env[1204]: time="2025-05-17T00:35:31.486520833Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:35:31.486654 env[1204]: time="2025-05-17T00:35:31.486558340Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:35:31.486654 env[1204]: time="2025-05-17T00:35:31.486583476Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:35:31.486654 env[1204]: time="2025-05-17T00:35:31.486606470Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:35:31.486654 env[1204]: time="2025-05-17T00:35:31.486633065Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:35:31.487010 env[1204]: time="2025-05-17T00:35:31.486670610Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:35:31.487010 env[1204]: time="2025-05-17T00:35:31.486698632Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:35:31.487010 env[1204]: time="2025-05-17T00:35:31.486722654Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:35:31.487010 env[1204]: time="2025-05-17T00:35:31.486748994Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:35:31.487010 env[1204]: time="2025-05-17T00:35:31.486974035Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:35:31.487299 env[1204]: time="2025-05-17T00:35:31.487126528Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:35:31.487561 env[1204]: time="2025-05-17T00:35:31.487523987Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:35:31.487645 env[1204]: time="2025-05-17T00:35:31.487586600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:35:31.487645 env[1204]: time="2025-05-17T00:35:31.487627896Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:35:31.487752 env[1204]: time="2025-05-17T00:35:31.487720818Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:35:31.487826 env[1204]: time="2025-05-17T00:35:31.487747878Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:35:31.487826 env[1204]: time="2025-05-17T00:35:31.487780564Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:35:31.487826 env[1204]: time="2025-05-17T00:35:31.487804840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:35:31.488024 env[1204]: time="2025-05-17T00:35:31.487828646Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:35:31.488024 env[1204]: time="2025-05-17T00:35:31.487853181Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:35:31.488024 env[1204]: time="2025-05-17T00:35:31.487877672Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:35:31.488024 env[1204]: time="2025-05-17T00:35:31.487899761Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:35:31.509208 env[1204]: time="2025-05-17T00:35:31.509147397Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:35:31.509495 env[1204]: time="2025-05-17T00:35:31.509448301Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:35:31.509624 env[1204]: time="2025-05-17T00:35:31.509511686Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:35:31.509624 env[1204]: time="2025-05-17T00:35:31.509543213Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:35:31.509624 env[1204]: time="2025-05-17T00:35:31.509571567Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:35:31.509624 env[1204]: time="2025-05-17T00:35:31.509606978Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:35:31.509873 env[1204]: time="2025-05-17T00:35:31.509632537Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:35:31.509873 env[1204]: time="2025-05-17T00:35:31.509667158Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:35:31.509873 env[1204]: time="2025-05-17T00:35:31.509726071Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:35:31.510261 env[1204]: time="2025-05-17T00:35:31.510153067Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:35:31.514996 env[1204]: time="2025-05-17T00:35:31.510279091Z" level=info msg="Connect containerd service" May 17 00:35:31.514996 env[1204]: time="2025-05-17T00:35:31.510346179Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:35:31.517802 polkitd[1250]: Started polkitd version 121 May 17 00:35:31.518361 env[1204]: time="2025-05-17T00:35:31.518301520Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:35:31.518794 env[1204]: time="2025-05-17T00:35:31.518751060Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:35:31.518894 env[1204]: time="2025-05-17T00:35:31.518854438Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:35:31.519125 systemd[1]: Started containerd.service. May 17 00:35:31.523994 env[1204]: time="2025-05-17T00:35:31.521050933Z" level=info msg="containerd successfully booted in 0.443380s" May 17 00:35:31.523994 env[1204]: time="2025-05-17T00:35:31.522006338Z" level=info msg="Start subscribing containerd event" May 17 00:35:31.523994 env[1204]: time="2025-05-17T00:35:31.522077501Z" level=info msg="Start recovering state" May 17 00:35:31.523994 env[1204]: time="2025-05-17T00:35:31.523055759Z" level=info msg="Start event monitor" May 17 00:35:31.523994 env[1204]: time="2025-05-17T00:35:31.523090529Z" level=info msg="Start snapshots syncer" May 17 00:35:31.523994 env[1204]: time="2025-05-17T00:35:31.523113443Z" level=info msg="Start cni network conf syncer for default" May 17 00:35:31.523994 env[1204]: time="2025-05-17T00:35:31.523129494Z" level=info msg="Start streaming server" May 17 00:35:31.549100 polkitd[1250]: Loading rules from directory /etc/polkit-1/rules.d May 17 00:35:31.549212 polkitd[1250]: Loading rules from directory /usr/share/polkit-1/rules.d May 17 00:35:31.564252 polkitd[1250]: Finished loading, compiling and executing 2 rules May 17 00:35:31.565011 dbus-daemon[1176]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' May 17 00:35:31.565294 systemd[1]: Started polkit.service. May 17 00:35:31.566051 polkitd[1250]: Acquired the name org.freedesktop.PolicyKit1 on the system bus May 17 00:35:31.605557 systemd-hostnamed[1230]: Hostname set to (transient) May 17 00:35:31.608787 systemd-resolved[1142]: System hostname changed to 'ci-3510-3-7-nightly-20250516-2100-4d93bffd9d88d2951645'. May 17 00:35:32.537785 sshd_keygen[1201]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:35:32.596890 systemd[1]: Finished sshd-keygen.service. May 17 00:35:32.607357 systemd[1]: Starting issuegen.service... May 17 00:35:32.624083 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:35:32.624390 systemd[1]: Finished issuegen.service. May 17 00:35:32.635577 systemd[1]: Starting systemd-user-sessions.service... May 17 00:35:32.649146 systemd[1]: Finished systemd-user-sessions.service. May 17 00:35:32.661997 systemd[1]: Started getty@tty1.service. May 17 00:35:32.671607 systemd[1]: Started serial-getty@ttyS0.service. May 17 00:35:32.680788 systemd[1]: Reached target getty.target. May 17 00:35:32.742165 locksmithd[1227]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:35:33.289275 systemd[1]: Started kubelet.service. May 17 00:35:34.293039 kubelet[1285]: E0517 00:35:34.292960 1285 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:35:34.295892 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:35:34.296205 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:35:34.296642 systemd[1]: kubelet.service: Consumed 1.497s CPU time. May 17 00:35:36.679167 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. May 17 00:35:38.748968 kernel: loop2: detected capacity change from 0 to 2097152 May 17 00:35:38.767394 systemd-nspawn[1292]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. May 17 00:35:38.767394 systemd-nspawn[1292]: Press ^] three times within 1s to kill container. May 17 00:35:38.781944 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:35:38.860046 systemd[1]: Started oem-gce.service. May 17 00:35:38.860543 systemd[1]: Reached target multi-user.target. May 17 00:35:38.863408 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:35:38.875425 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:35:38.875700 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:35:38.876296 systemd[1]: Startup finished in 1.097s (kernel) + 7.704s (initrd) + 16.350s (userspace) = 25.153s. May 17 00:35:38.925797 systemd-nspawn[1292]: + '[' -e /etc/default/instance_configs.cfg.template ']' May 17 00:35:38.926045 systemd-nspawn[1292]: + echo -e '[InstanceSetup]\nset_host_keys = false' May 17 00:35:38.926045 systemd-nspawn[1292]: + /usr/bin/google_instance_setup May 17 00:35:39.236770 systemd[1]: Created slice system-sshd.slice. May 17 00:35:39.240404 systemd[1]: Started sshd@0-10.128.0.12:22-139.178.89.65:57268.service. May 17 00:35:39.581441 sshd[1300]: Accepted publickey for core from 139.178.89.65 port 57268 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:35:39.585804 sshd[1300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:35:39.608128 systemd[1]: Created slice user-500.slice. May 17 00:35:39.612299 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:35:39.621134 systemd-logind[1215]: New session 1 of user core. May 17 00:35:39.631313 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:35:39.637672 systemd[1]: Starting user@500.service... May 17 00:35:39.647669 instance-setup[1298]: INFO Running google_set_multiqueue. May 17 00:35:39.655589 (systemd)[1309]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:35:39.672280 instance-setup[1298]: INFO Set channels for eth0 to 2. May 17 00:35:39.678453 instance-setup[1298]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. May 17 00:35:39.680785 instance-setup[1298]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 May 17 00:35:39.681650 instance-setup[1298]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. May 17 00:35:39.684741 instance-setup[1298]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 May 17 00:35:39.684963 instance-setup[1298]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. May 17 00:35:39.687325 instance-setup[1298]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 May 17 00:35:39.687542 instance-setup[1298]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. May 17 00:35:39.690174 instance-setup[1298]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 May 17 00:35:39.706762 instance-setup[1298]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus May 17 00:35:39.706998 instance-setup[1298]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus May 17 00:35:39.768588 systemd-nspawn[1292]: + /usr/bin/google_metadata_script_runner --script-type startup May 17 00:35:39.838726 systemd[1309]: Queued start job for default target default.target. May 17 00:35:39.840674 systemd[1309]: Reached target paths.target. May 17 00:35:39.840733 systemd[1309]: Reached target sockets.target. May 17 00:35:39.840766 systemd[1309]: Reached target timers.target. May 17 00:35:39.840792 systemd[1309]: Reached target basic.target. May 17 00:35:39.840990 systemd[1]: Started user@500.service. May 17 00:35:39.842796 systemd[1]: Started session-1.scope. May 17 00:35:39.845991 systemd[1309]: Reached target default.target. May 17 00:35:39.846867 systemd[1309]: Startup finished in 177ms. May 17 00:35:40.079395 systemd[1]: Started sshd@1-10.128.0.12:22-139.178.89.65:57280.service. May 17 00:35:40.234756 startup-script[1339]: INFO Starting startup scripts. May 17 00:35:40.248609 startup-script[1339]: INFO No startup scripts found in metadata. May 17 00:35:40.248800 startup-script[1339]: INFO Finished running startup scripts. May 17 00:35:40.287487 systemd-nspawn[1292]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM May 17 00:35:40.287487 systemd-nspawn[1292]: + daemon_pids=() May 17 00:35:40.287487 systemd-nspawn[1292]: + for d in accounts clock_skew network May 17 00:35:40.287955 systemd-nspawn[1292]: + daemon_pids+=($!) May 17 00:35:40.287955 systemd-nspawn[1292]: + for d in accounts clock_skew network May 17 00:35:40.288254 systemd-nspawn[1292]: + daemon_pids+=($!) May 17 00:35:40.288359 systemd-nspawn[1292]: + for d in accounts clock_skew network May 17 00:35:40.288671 systemd-nspawn[1292]: + daemon_pids+=($!) May 17 00:35:40.288783 systemd-nspawn[1292]: + NOTIFY_SOCKET=/run/systemd/notify May 17 00:35:40.288783 systemd-nspawn[1292]: + /usr/bin/systemd-notify --ready May 17 00:35:40.289247 systemd-nspawn[1292]: + /usr/bin/google_accounts_daemon May 17 00:35:40.289637 systemd-nspawn[1292]: + /usr/bin/google_clock_skew_daemon May 17 00:35:40.290075 systemd-nspawn[1292]: + /usr/bin/google_network_daemon May 17 00:35:40.355071 systemd-nspawn[1292]: + wait -n 36 37 38 May 17 00:35:40.429067 sshd[1343]: Accepted publickey for core from 139.178.89.65 port 57280 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:35:40.430252 sshd[1343]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:35:40.439781 systemd[1]: Started session-2.scope. May 17 00:35:40.440700 systemd-logind[1215]: New session 2 of user core. May 17 00:35:40.653042 sshd[1343]: pam_unix(sshd:session): session closed for user core May 17 00:35:40.659989 systemd[1]: sshd@1-10.128.0.12:22-139.178.89.65:57280.service: Deactivated successfully. May 17 00:35:40.661242 systemd[1]: session-2.scope: Deactivated successfully. May 17 00:35:40.663863 systemd-logind[1215]: Session 2 logged out. Waiting for processes to exit. May 17 00:35:40.665832 systemd-logind[1215]: Removed session 2. May 17 00:35:40.702052 systemd[1]: Started sshd@2-10.128.0.12:22-139.178.89.65:57288.service. May 17 00:35:41.015406 sshd[1355]: Accepted publickey for core from 139.178.89.65 port 57288 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:35:41.018485 sshd[1355]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:35:41.027715 systemd[1]: Started session-3.scope. May 17 00:35:41.030617 systemd-logind[1215]: New session 3 of user core. May 17 00:35:41.128586 groupadd[1364]: group added to /etc/group: name=google-sudoers, GID=1000 May 17 00:35:41.132726 groupadd[1364]: group added to /etc/gshadow: name=google-sudoers May 17 00:35:41.138224 google-clock-skew[1348]: INFO Starting Google Clock Skew daemon. May 17 00:35:41.155761 google-clock-skew[1348]: INFO Clock drift token has changed: 0. May 17 00:35:41.157764 groupadd[1364]: new group: name=google-sudoers, GID=1000 May 17 00:35:41.169095 systemd-nspawn[1292]: hwclock: Cannot access the Hardware Clock via any known method. May 17 00:35:41.169871 systemd-nspawn[1292]: hwclock: Use the --verbose option to see the details of our search for an access method. May 17 00:35:41.171140 google-clock-skew[1348]: WARNING Failed to sync system time with hardware clock. May 17 00:35:41.185710 google-accounts[1347]: INFO Starting Google Accounts daemon. May 17 00:35:41.223048 google-accounts[1347]: WARNING OS Login not installed. May 17 00:35:41.224295 google-accounts[1347]: INFO Creating a new user account for 0. May 17 00:35:41.226630 sshd[1355]: pam_unix(sshd:session): session closed for user core May 17 00:35:41.232584 systemd[1]: sshd@2-10.128.0.12:22-139.178.89.65:57288.service: Deactivated successfully. May 17 00:35:41.234162 systemd[1]: session-3.scope: Deactivated successfully. May 17 00:35:41.235589 systemd-logind[1215]: Session 3 logged out. Waiting for processes to exit. May 17 00:35:41.237988 systemd-logind[1215]: Removed session 3. May 17 00:35:41.240415 systemd-nspawn[1292]: useradd: invalid user name '0': use --badname to ignore May 17 00:35:41.241589 google-accounts[1347]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. May 17 00:35:41.255512 google-networking[1349]: INFO Starting Google Networking daemon. May 17 00:35:41.275692 systemd[1]: Started sshd@3-10.128.0.12:22-139.178.89.65:57302.service. May 17 00:35:41.572965 sshd[1379]: Accepted publickey for core from 139.178.89.65 port 57302 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:35:41.575260 sshd[1379]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:35:41.582609 systemd[1]: Started session-4.scope. May 17 00:35:41.583308 systemd-logind[1215]: New session 4 of user core. May 17 00:35:41.791125 sshd[1379]: pam_unix(sshd:session): session closed for user core May 17 00:35:41.795859 systemd[1]: sshd@3-10.128.0.12:22-139.178.89.65:57302.service: Deactivated successfully. May 17 00:35:41.797042 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:35:41.798002 systemd-logind[1215]: Session 4 logged out. Waiting for processes to exit. May 17 00:35:41.799409 systemd-logind[1215]: Removed session 4. May 17 00:35:41.837884 systemd[1]: Started sshd@4-10.128.0.12:22-139.178.89.65:57312.service. May 17 00:35:42.130233 sshd[1385]: Accepted publickey for core from 139.178.89.65 port 57312 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:35:42.132435 sshd[1385]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:35:42.139478 systemd-logind[1215]: New session 5 of user core. May 17 00:35:42.140255 systemd[1]: Started session-5.scope. May 17 00:35:42.331568 sudo[1388]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:35:42.332101 sudo[1388]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:35:42.342190 dbus-daemon[1176]: \xd0}\x91\x89\xd4U: received setenforce notice (enforcing=-454290992) May 17 00:35:42.344784 sudo[1388]: pam_unix(sudo:session): session closed for user root May 17 00:35:42.389731 sshd[1385]: pam_unix(sshd:session): session closed for user core May 17 00:35:42.395531 systemd[1]: sshd@4-10.128.0.12:22-139.178.89.65:57312.service: Deactivated successfully. May 17 00:35:42.396869 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:35:42.398029 systemd-logind[1215]: Session 5 logged out. Waiting for processes to exit. May 17 00:35:42.399729 systemd-logind[1215]: Removed session 5. May 17 00:35:42.438561 systemd[1]: Started sshd@5-10.128.0.12:22-139.178.89.65:57328.service. May 17 00:35:42.738750 sshd[1392]: Accepted publickey for core from 139.178.89.65 port 57328 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:35:42.740583 sshd[1392]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:35:42.748221 systemd[1]: Started session-6.scope. May 17 00:35:42.748884 systemd-logind[1215]: New session 6 of user core. May 17 00:35:42.921330 sudo[1396]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:35:42.921843 sudo[1396]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:35:42.926720 sudo[1396]: pam_unix(sudo:session): session closed for user root May 17 00:35:42.940155 sudo[1395]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:35:42.940691 sudo[1395]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:35:42.955162 systemd[1]: Stopping audit-rules.service... May 17 00:35:42.956000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:35:42.962856 kernel: kauditd_printk_skb: 208 callbacks suppressed May 17 00:35:42.963015 kernel: audit: type=1305 audit(1747442142.956:188): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:35:42.963085 auditctl[1399]: No rules May 17 00:35:42.964307 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:35:42.964625 systemd[1]: Stopped audit-rules.service. May 17 00:35:42.956000 audit[1399]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdc4812c00 a2=420 a3=0 items=0 ppid=1 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:42.980054 systemd[1]: Starting audit-rules.service... May 17 00:35:43.009076 kernel: audit: type=1300 audit(1747442142.956:188): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdc4812c00 a2=420 a3=0 items=0 ppid=1 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:42.956000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:35:43.018934 kernel: audit: type=1327 audit(1747442142.956:188): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:35:42.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:43.041976 kernel: audit: type=1131 audit(1747442142.963:189): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:43.051504 augenrules[1416]: No rules May 17 00:35:43.052420 systemd[1]: Finished audit-rules.service. May 17 00:35:43.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:43.054355 sudo[1395]: pam_unix(sudo:session): session closed for user root May 17 00:35:43.053000 audit[1395]: USER_END pid=1395 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:35:43.100119 kernel: audit: type=1130 audit(1747442143.051:190): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:43.100329 kernel: audit: type=1106 audit(1747442143.053:191): pid=1395 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:35:43.100392 kernel: audit: type=1104 audit(1747442143.053:192): pid=1395 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:35:43.053000 audit[1395]: CRED_DISP pid=1395 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:35:43.123847 sshd[1392]: pam_unix(sshd:session): session closed for user core May 17 00:35:43.125000 audit[1392]: USER_END pid=1392 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:43.130880 systemd[1]: sshd@5-10.128.0.12:22-139.178.89.65:57328.service: Deactivated successfully. May 17 00:35:43.132274 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:35:43.139513 systemd-logind[1215]: Session 6 logged out. Waiting for processes to exit. May 17 00:35:43.141939 systemd-logind[1215]: Removed session 6. May 17 00:35:43.184287 kernel: audit: type=1106 audit(1747442143.125:193): pid=1392 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:43.184436 kernel: audit: type=1104 audit(1747442143.125:194): pid=1392 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:43.125000 audit[1392]: CRED_DISP pid=1392 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:43.168761 systemd[1]: Started sshd@6-10.128.0.12:22-139.178.89.65:57340.service. May 17 00:35:43.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.12:22-139.178.89.65:57328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:43.212111 kernel: audit: type=1131 audit(1747442143.125:195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.12:22-139.178.89.65:57328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:43.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.12:22-139.178.89.65:57340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:43.466000 audit[1422]: USER_ACCT pid=1422 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:43.467758 sshd[1422]: Accepted publickey for core from 139.178.89.65 port 57340 ssh2: RSA SHA256:jyE3lnafiBGDGJK6dHnApyF/jgfCnjVgkPORJQqM9Ps May 17 00:35:43.469000 audit[1422]: CRED_ACQ pid=1422 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:43.469000 audit[1422]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4edd96c0 a2=3 a3=0 items=0 ppid=1 pid=1422 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:43.469000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:35:43.470859 sshd[1422]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:35:43.478211 systemd[1]: Started session-7.scope. May 17 00:35:43.479264 systemd-logind[1215]: New session 7 of user core. May 17 00:35:43.487000 audit[1422]: USER_START pid=1422 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:43.490000 audit[1424]: CRED_ACQ pid=1424 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:43.646000 audit[1425]: USER_ACCT pid=1425 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:35:43.647161 sudo[1425]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:35:43.646000 audit[1425]: CRED_REFR pid=1425 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:35:43.647668 sudo[1425]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:35:43.649000 audit[1425]: USER_START pid=1425 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:35:43.667334 systemd[1]: Starting coreos-metadata.service... May 17 00:35:43.716643 coreos-metadata[1429]: May 17 00:35:43.716 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/hostname: Attempt #1 May 17 00:35:43.718052 coreos-metadata[1429]: May 17 00:35:43.717 INFO Fetch successful May 17 00:35:43.718052 coreos-metadata[1429]: May 17 00:35:43.717 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/access-configs/0/external-ip: Attempt #1 May 17 00:35:43.718523 coreos-metadata[1429]: May 17 00:35:43.718 INFO Fetch successful May 17 00:35:43.719720 coreos-metadata[1429]: May 17 00:35:43.719 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/ip: Attempt #1 May 17 00:35:43.720014 coreos-metadata[1429]: May 17 00:35:43.719 INFO Fetch successful May 17 00:35:43.720100 coreos-metadata[1429]: May 17 00:35:43.720 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/machine-type: Attempt #1 May 17 00:35:43.721371 coreos-metadata[1429]: May 17 00:35:43.721 INFO Fetch successful May 17 00:35:43.733000 systemd[1]: Finished coreos-metadata.service. May 17 00:35:43.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:44.469389 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 17 00:35:44.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:44.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:44.470155 systemd[1]: Stopped kubelet.service. May 17 00:35:44.470252 systemd[1]: kubelet.service: Consumed 1.497s CPU time. May 17 00:35:44.473098 systemd[1]: Starting kubelet.service... May 17 00:35:44.688819 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 17 00:35:44.689022 systemd[1]: kubelet.service: Failed with result 'signal'. May 17 00:35:44.689408 systemd[1]: Stopped kubelet.service. May 17 00:35:44.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:35:44.693422 systemd[1]: Starting kubelet.service... May 17 00:35:44.759401 systemd[1]: Reloading. May 17 00:35:44.923745 /usr/lib/systemd/system-generators/torcx-generator[1492]: time="2025-05-17T00:35:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:35:44.924564 /usr/lib/systemd/system-generators/torcx-generator[1492]: time="2025-05-17T00:35:44Z" level=info msg="torcx already run" May 17 00:35:45.060240 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:35:45.060272 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:35:45.087976 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:35:45.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.187000 audit: BPF prog-id=43 op=LOAD May 17 00:35:45.187000 audit: BPF prog-id=38 op=UNLOAD May 17 00:35:45.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.188000 audit: BPF prog-id=44 op=LOAD May 17 00:35:45.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.188000 audit: BPF prog-id=45 op=LOAD May 17 00:35:45.188000 audit: BPF prog-id=24 op=UNLOAD May 17 00:35:45.188000 audit: BPF prog-id=25 op=UNLOAD May 17 00:35:45.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.190000 audit: BPF prog-id=46 op=LOAD May 17 00:35:45.190000 audit: BPF prog-id=33 op=UNLOAD May 17 00:35:45.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.191000 audit: BPF prog-id=47 op=LOAD May 17 00:35:45.192000 audit: BPF prog-id=26 op=UNLOAD May 17 00:35:45.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.192000 audit: BPF prog-id=48 op=LOAD May 17 00:35:45.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.192000 audit: BPF prog-id=49 op=LOAD May 17 00:35:45.192000 audit: BPF prog-id=27 op=UNLOAD May 17 00:35:45.192000 audit: BPF prog-id=28 op=UNLOAD May 17 00:35:45.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.198000 audit: BPF prog-id=50 op=LOAD May 17 00:35:45.198000 audit: BPF prog-id=35 op=UNLOAD May 17 00:35:45.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.198000 audit: BPF prog-id=51 op=LOAD May 17 00:35:45.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.198000 audit: BPF prog-id=52 op=LOAD May 17 00:35:45.198000 audit: BPF prog-id=36 op=UNLOAD May 17 00:35:45.198000 audit: BPF prog-id=37 op=UNLOAD May 17 00:35:45.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.229000 audit: BPF prog-id=53 op=LOAD May 17 00:35:45.229000 audit: BPF prog-id=39 op=UNLOAD May 17 00:35:45.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.229000 audit: BPF prog-id=54 op=LOAD May 17 00:35:45.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.229000 audit: BPF prog-id=55 op=LOAD May 17 00:35:45.229000 audit: BPF prog-id=40 op=UNLOAD May 17 00:35:45.229000 audit: BPF prog-id=41 op=UNLOAD May 17 00:35:45.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.231000 audit: BPF prog-id=56 op=LOAD May 17 00:35:45.231000 audit: BPF prog-id=29 op=UNLOAD May 17 00:35:45.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.232000 audit: BPF prog-id=57 op=LOAD May 17 00:35:45.233000 audit: BPF prog-id=34 op=UNLOAD May 17 00:35:45.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.234000 audit: BPF prog-id=58 op=LOAD May 17 00:35:45.234000 audit: BPF prog-id=30 op=UNLOAD May 17 00:35:45.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.235000 audit: BPF prog-id=59 op=LOAD May 17 00:35:45.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:45.235000 audit: BPF prog-id=60 op=LOAD May 17 00:35:45.235000 audit: BPF prog-id=31 op=UNLOAD May 17 00:35:45.235000 audit: BPF prog-id=32 op=UNLOAD May 17 00:35:45.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:45.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:45.264544 systemd[1]: Started kubelet.service. May 17 00:35:45.267490 systemd[1]: Stopping kubelet.service... May 17 00:35:45.268107 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:35:45.268434 systemd[1]: Stopped kubelet.service. May 17 00:35:45.272005 systemd[1]: Starting kubelet.service... May 17 00:35:45.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:45.602888 systemd[1]: Started kubelet.service. May 17 00:35:45.664117 kubelet[1534]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:35:45.664117 kubelet[1534]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:35:45.664117 kubelet[1534]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:35:45.664770 kubelet[1534]: I0517 00:35:45.664289 1534 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:35:46.524321 kubelet[1534]: I0517 00:35:46.524269 1534 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" May 17 00:35:46.524566 kubelet[1534]: I0517 00:35:46.524544 1534 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:35:46.525468 kubelet[1534]: I0517 00:35:46.525433 1534 server.go:954] "Client rotation is on, will bootstrap in background" May 17 00:35:46.573572 kubelet[1534]: I0517 00:35:46.573519 1534 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:35:46.589506 kubelet[1534]: E0517 00:35:46.589439 1534 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:35:46.589506 kubelet[1534]: I0517 00:35:46.589503 1534 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:35:46.593611 kubelet[1534]: I0517 00:35:46.593571 1534 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:35:46.594064 kubelet[1534]: I0517 00:35:46.593997 1534 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:35:46.594327 kubelet[1534]: I0517 00:35:46.594049 1534 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.128.0.12","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:35:46.594539 kubelet[1534]: I0517 00:35:46.594336 1534 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:35:46.594539 kubelet[1534]: I0517 00:35:46.594356 1534 container_manager_linux.go:304] "Creating device plugin manager" May 17 00:35:46.594539 kubelet[1534]: I0517 00:35:46.594536 1534 state_mem.go:36] "Initialized new in-memory state store" May 17 00:35:46.600029 kubelet[1534]: I0517 00:35:46.599978 1534 kubelet.go:446] "Attempting to sync node with API server" May 17 00:35:46.600029 kubelet[1534]: I0517 00:35:46.600043 1534 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:35:46.600230 kubelet[1534]: I0517 00:35:46.600079 1534 kubelet.go:352] "Adding apiserver pod source" May 17 00:35:46.600230 kubelet[1534]: I0517 00:35:46.600104 1534 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:35:46.615541 kubelet[1534]: E0517 00:35:46.615466 1534 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:35:46.615750 kubelet[1534]: E0517 00:35:46.615582 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:35:46.617474 kubelet[1534]: I0517 00:35:46.617429 1534 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:35:46.618063 kubelet[1534]: I0517 00:35:46.618026 1534 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:35:46.618190 kubelet[1534]: W0517 00:35:46.618111 1534 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:35:46.621082 kubelet[1534]: I0517 00:35:46.621036 1534 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:35:46.621228 kubelet[1534]: I0517 00:35:46.621108 1534 server.go:1287] "Started kubelet" May 17 00:35:46.621402 kubelet[1534]: I0517 00:35:46.621366 1534 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:35:46.621579 kubelet[1534]: I0517 00:35:46.621515 1534 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:35:46.622116 kubelet[1534]: I0517 00:35:46.622083 1534 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:35:46.623092 kubelet[1534]: I0517 00:35:46.623065 1534 server.go:479] "Adding debug handlers to kubelet server" May 17 00:35:46.625000 audit[1534]: AVC avc: denied { mac_admin } for pid=1534 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.625000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:35:46.625000 audit[1534]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000be4ed0 a1=c0005c5ad0 a2=c000be4ea0 a3=25 items=0 ppid=1 pid=1534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:46.625000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:35:46.626000 audit[1534]: AVC avc: denied { mac_admin } for pid=1534 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.626000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:35:46.626000 audit[1534]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bc2d80 a1=c0005c5ae8 a2=c000be4f60 a3=25 items=0 ppid=1 pid=1534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:46.626000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:35:46.627733 kubelet[1534]: I0517 00:35:46.626870 1534 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:35:46.627733 kubelet[1534]: I0517 00:35:46.627365 1534 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:35:46.627733 kubelet[1534]: I0517 00:35:46.627509 1534 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:35:46.635854 kubelet[1534]: I0517 00:35:46.635814 1534 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:35:46.647743 kubelet[1534]: E0517 00:35:46.645206 1534 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.128.0.12.1840295fbee4fc4d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.128.0.12,UID:10.128.0.12,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.128.0.12,},FirstTimestamp:2025-05-17 00:35:46.621062221 +0000 UTC m=+1.010585674,LastTimestamp:2025-05-17 00:35:46.621062221 +0000 UTC m=+1.010585674,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.128.0.12,}" May 17 00:35:46.648719 kubelet[1534]: I0517 00:35:46.648686 1534 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:35:46.649547 kubelet[1534]: E0517 00:35:46.649512 1534 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.128.0.12\" not found" May 17 00:35:46.650624 kubelet[1534]: I0517 00:35:46.650592 1534 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:35:46.650843 kubelet[1534]: I0517 00:35:46.650822 1534 reconciler.go:26] "Reconciler: start to sync state" May 17 00:35:46.662426 kubelet[1534]: I0517 00:35:46.662365 1534 factory.go:221] Registration of the systemd container factory successfully May 17 00:35:46.662604 kubelet[1534]: I0517 00:35:46.662514 1534 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:35:46.670350 kubelet[1534]: I0517 00:35:46.670279 1534 factory.go:221] Registration of the containerd container factory successfully May 17 00:35:46.692009 kubelet[1534]: E0517 00:35:46.690119 1534 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.128.0.12\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" May 17 00:35:46.692009 kubelet[1534]: W0517 00:35:46.690237 1534 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope May 17 00:35:46.692009 kubelet[1534]: E0517 00:35:46.690274 1534 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" May 17 00:35:46.692009 kubelet[1534]: W0517 00:35:46.690338 1534 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.128.0.12" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope May 17 00:35:46.692009 kubelet[1534]: E0517 00:35:46.690357 1534 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.128.0.12\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" May 17 00:35:46.692009 kubelet[1534]: W0517 00:35:46.690423 1534 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope May 17 00:35:46.692009 kubelet[1534]: E0517 00:35:46.690442 1534 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" May 17 00:35:46.699330 kubelet[1534]: I0517 00:35:46.699298 1534 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:35:46.699581 kubelet[1534]: I0517 00:35:46.699560 1534 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:35:46.699731 kubelet[1534]: I0517 00:35:46.699714 1534 state_mem.go:36] "Initialized new in-memory state store" May 17 00:35:46.702606 kubelet[1534]: E0517 00:35:46.702052 1534 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.128.0.12.1840295fc375d51b default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.128.0.12,UID:10.128.0.12,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.128.0.12 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.128.0.12,},FirstTimestamp:2025-05-17 00:35:46.697663771 +0000 UTC m=+1.087187214,LastTimestamp:2025-05-17 00:35:46.697663771 +0000 UTC m=+1.087187214,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.128.0.12,}" May 17 00:35:46.704012 kubelet[1534]: I0517 00:35:46.703984 1534 policy_none.go:49] "None policy: Start" May 17 00:35:46.704234 kubelet[1534]: I0517 00:35:46.704213 1534 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:35:46.704388 kubelet[1534]: I0517 00:35:46.704368 1534 state_mem.go:35] "Initializing new in-memory state store" May 17 00:35:46.704000 audit[1548]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1548 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:46.704000 audit[1548]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffda52086c0 a2=0 a3=7ffda52086ac items=0 ppid=1534 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:46.704000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:35:46.707000 audit[1553]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1553 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:46.707000 audit[1553]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffcd6ab90a0 a2=0 a3=7ffcd6ab908c items=0 ppid=1534 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:46.707000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:35:46.716604 systemd[1]: Created slice kubepods.slice. May 17 00:35:46.728187 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:35:46.734472 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:35:46.712000 audit[1555]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1555 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:46.712000 audit[1555]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd45c8e820 a2=0 a3=7ffd45c8e80c items=0 ppid=1534 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:46.712000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:35:46.744656 kubelet[1534]: I0517 00:35:46.744621 1534 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:35:46.742000 audit[1534]: AVC avc: denied { mac_admin } for pid=1534 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:46.742000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:35:46.745457 kubelet[1534]: I0517 00:35:46.745412 1534 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:35:46.745818 kubelet[1534]: I0517 00:35:46.745796 1534 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:35:46.742000 audit[1534]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bbe810 a1=c000bd62e8 a2=c000bbe7e0 a3=25 items=0 ppid=1 pid=1534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:46.742000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:35:46.746772 kubelet[1534]: I0517 00:35:46.746707 1534 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:35:46.747951 kubelet[1534]: I0517 00:35:46.747927 1534 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:35:46.750167 kubelet[1534]: E0517 00:35:46.749887 1534 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:35:46.750409 kubelet[1534]: E0517 00:35:46.750375 1534 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.128.0.12\" not found" May 17 00:35:46.751000 audit[1561]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1561 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:46.751000 audit[1561]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe214b79a0 a2=0 a3=7ffe214b798c items=0 ppid=1534 pid=1561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:46.751000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:35:46.815000 audit[1566]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1566 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:46.815000 audit[1566]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd9c83a360 a2=0 a3=7ffd9c83a34c items=0 ppid=1534 pid=1566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:46.815000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:35:46.818000 audit[1567]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1567 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:46.818000 audit[1567]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd163a9460 a2=0 a3=7ffd163a944c items=0 ppid=1534 pid=1567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:46.818000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:35:46.821560 kubelet[1534]: I0517 00:35:46.817325 1534 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:35:46.821560 kubelet[1534]: I0517 00:35:46.820692 1534 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:35:46.821560 kubelet[1534]: I0517 00:35:46.820736 1534 status_manager.go:227] "Starting to sync pod status with apiserver" May 17 00:35:46.821560 kubelet[1534]: I0517 00:35:46.820765 1534 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:35:46.821560 kubelet[1534]: I0517 00:35:46.820778 1534 kubelet.go:2382] "Starting kubelet main sync loop" May 17 00:35:46.821560 kubelet[1534]: E0517 00:35:46.820876 1534 kubelet.go:2406] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 17 00:35:46.822000 audit[1568]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1568 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:46.822000 audit[1568]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe36b7f220 a2=0 a3=7ffe36b7f20c items=0 ppid=1534 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:46.822000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:35:46.826000 audit[1569]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1569 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:46.826000 audit[1569]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2fda12e0 a2=0 a3=7ffe2fda12cc items=0 ppid=1534 pid=1569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:46.826000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:35:46.829000 audit[1570]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1570 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:46.829000 audit[1570]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdbad09f70 a2=0 a3=7ffdbad09f5c items=0 ppid=1534 pid=1570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:46.829000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:35:46.830000 audit[1571]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1571 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:46.830000 audit[1571]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd5ebb9860 a2=0 a3=7ffd5ebb984c items=0 ppid=1534 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:46.830000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:35:46.832000 audit[1572]: NETFILTER_CFG table=filter:12 family=10 entries=2 op=nft_register_chain pid=1572 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:46.832000 audit[1572]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe7df31950 a2=0 a3=7ffe7df3193c items=0 ppid=1534 pid=1572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:46.832000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:35:46.833000 audit[1573]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1573 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:46.833000 audit[1573]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffca177d20 a2=0 a3=7fffca177d0c items=0 ppid=1534 pid=1573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:46.833000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:35:46.848720 kubelet[1534]: I0517 00:35:46.848654 1534 kubelet_node_status.go:75] "Attempting to register node" node="10.128.0.12" May 17 00:35:46.856381 kubelet[1534]: I0517 00:35:46.856322 1534 kubelet_node_status.go:78] "Successfully registered node" node="10.128.0.12" May 17 00:35:46.856381 kubelet[1534]: E0517 00:35:46.856364 1534 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"10.128.0.12\": node \"10.128.0.12\" not found" May 17 00:35:46.903472 kubelet[1534]: E0517 00:35:46.903423 1534 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.128.0.12\" not found" May 17 00:35:47.003632 kubelet[1534]: E0517 00:35:47.003564 1534 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.128.0.12\" not found" May 17 00:35:47.103962 kubelet[1534]: E0517 00:35:47.103783 1534 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.128.0.12\" not found" May 17 00:35:47.204223 kubelet[1534]: E0517 00:35:47.204150 1534 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.128.0.12\" not found" May 17 00:35:47.304442 kubelet[1534]: E0517 00:35:47.304371 1534 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.128.0.12\" not found" May 17 00:35:47.405269 kubelet[1534]: E0517 00:35:47.405194 1534 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.128.0.12\" not found" May 17 00:35:47.505492 kubelet[1534]: E0517 00:35:47.505414 1534 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.128.0.12\" not found" May 17 00:35:47.530793 kubelet[1534]: I0517 00:35:47.530692 1534 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 17 00:35:47.531033 kubelet[1534]: W0517 00:35:47.531002 1534 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 17 00:35:47.606016 kubelet[1534]: E0517 00:35:47.605929 1534 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.128.0.12\" not found" May 17 00:35:47.616411 kubelet[1534]: E0517 00:35:47.616333 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:35:47.670000 audit[1425]: USER_END pid=1425 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:35:47.670000 audit[1425]: CRED_DISP pid=1425 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:35:47.671226 sudo[1425]: pam_unix(sudo:session): session closed for user root May 17 00:35:47.706710 kubelet[1534]: E0517 00:35:47.706643 1534 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.128.0.12\" not found" May 17 00:35:47.714636 sshd[1422]: pam_unix(sshd:session): session closed for user core May 17 00:35:47.716000 audit[1422]: USER_END pid=1422 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:47.716000 audit[1422]: CRED_DISP pid=1422 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 17 00:35:47.720095 systemd[1]: sshd@6-10.128.0.12:22-139.178.89.65:57340.service: Deactivated successfully. May 17 00:35:47.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.12:22-139.178.89.65:57340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.721499 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:35:47.722593 systemd-logind[1215]: Session 7 logged out. Waiting for processes to exit. May 17 00:35:47.724384 systemd-logind[1215]: Removed session 7. May 17 00:35:47.807429 kubelet[1534]: E0517 00:35:47.807353 1534 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.128.0.12\" not found" May 17 00:35:47.908377 kubelet[1534]: E0517 00:35:47.908307 1534 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.128.0.12\" not found" May 17 00:35:48.009639 kubelet[1534]: E0517 00:35:48.009480 1534 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.128.0.12\" not found" May 17 00:35:48.110661 kubelet[1534]: E0517 00:35:48.110585 1534 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.128.0.12\" not found" May 17 00:35:48.211016 kubelet[1534]: E0517 00:35:48.210931 1534 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.128.0.12\" not found" May 17 00:35:48.312860 kubelet[1534]: I0517 00:35:48.312472 1534 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 17 00:35:48.313184 env[1204]: time="2025-05-17T00:35:48.313113336Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:35:48.313740 kubelet[1534]: I0517 00:35:48.313416 1534 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 17 00:35:48.612152 kubelet[1534]: I0517 00:35:48.612000 1534 apiserver.go:52] "Watching apiserver" May 17 00:35:48.617264 kubelet[1534]: E0517 00:35:48.617185 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:35:48.623963 kubelet[1534]: E0517 00:35:48.623884 1534 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pt9zn" podUID="a1c914fd-f7a4-4351-b87f-b130b6eea600" May 17 00:35:48.631854 systemd[1]: Created slice kubepods-besteffort-pod83fe66b1_014d_4691_8ea1_458687f40746.slice. May 17 00:35:48.643666 systemd[1]: Created slice kubepods-besteffort-podfb73bc92_60e0_4007_bc34_839eddf9459f.slice. May 17 00:35:48.652037 kubelet[1534]: I0517 00:35:48.651970 1534 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:35:48.660161 kubelet[1534]: I0517 00:35:48.660064 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/83fe66b1-014d-4691-8ea1-458687f40746-lib-modules\") pod \"calico-node-r6mk6\" (UID: \"83fe66b1-014d-4691-8ea1-458687f40746\") " pod="calico-system/calico-node-r6mk6" May 17 00:35:48.660505 kubelet[1534]: I0517 00:35:48.660451 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5tj4z\" (UniqueName: \"kubernetes.io/projected/83fe66b1-014d-4691-8ea1-458687f40746-kube-api-access-5tj4z\") pod \"calico-node-r6mk6\" (UID: \"83fe66b1-014d-4691-8ea1-458687f40746\") " pod="calico-system/calico-node-r6mk6" May 17 00:35:48.660619 kubelet[1534]: I0517 00:35:48.660527 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4rjm5\" (UniqueName: \"kubernetes.io/projected/a1c914fd-f7a4-4351-b87f-b130b6eea600-kube-api-access-4rjm5\") pod \"csi-node-driver-pt9zn\" (UID: \"a1c914fd-f7a4-4351-b87f-b130b6eea600\") " pod="calico-system/csi-node-driver-pt9zn" May 17 00:35:48.660619 kubelet[1534]: I0517 00:35:48.660567 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/fb73bc92-60e0-4007-bc34-839eddf9459f-xtables-lock\") pod \"kube-proxy-8qsmz\" (UID: \"fb73bc92-60e0-4007-bc34-839eddf9459f\") " pod="kube-system/kube-proxy-8qsmz" May 17 00:35:48.660619 kubelet[1534]: I0517 00:35:48.660595 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/83fe66b1-014d-4691-8ea1-458687f40746-cni-bin-dir\") pod \"calico-node-r6mk6\" (UID: \"83fe66b1-014d-4691-8ea1-458687f40746\") " pod="calico-system/calico-node-r6mk6" May 17 00:35:48.660842 kubelet[1534]: I0517 00:35:48.660650 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/83fe66b1-014d-4691-8ea1-458687f40746-cni-net-dir\") pod \"calico-node-r6mk6\" (UID: \"83fe66b1-014d-4691-8ea1-458687f40746\") " pod="calico-system/calico-node-r6mk6" May 17 00:35:48.660842 kubelet[1534]: I0517 00:35:48.660684 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/83fe66b1-014d-4691-8ea1-458687f40746-tigera-ca-bundle\") pod \"calico-node-r6mk6\" (UID: \"83fe66b1-014d-4691-8ea1-458687f40746\") " pod="calico-system/calico-node-r6mk6" May 17 00:35:48.660842 kubelet[1534]: I0517 00:35:48.660716 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/83fe66b1-014d-4691-8ea1-458687f40746-xtables-lock\") pod \"calico-node-r6mk6\" (UID: \"83fe66b1-014d-4691-8ea1-458687f40746\") " pod="calico-system/calico-node-r6mk6" May 17 00:35:48.660842 kubelet[1534]: I0517 00:35:48.660745 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/a1c914fd-f7a4-4351-b87f-b130b6eea600-registration-dir\") pod \"csi-node-driver-pt9zn\" (UID: \"a1c914fd-f7a4-4351-b87f-b130b6eea600\") " pod="calico-system/csi-node-driver-pt9zn" May 17 00:35:48.660842 kubelet[1534]: I0517 00:35:48.660792 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/a1c914fd-f7a4-4351-b87f-b130b6eea600-varrun\") pod \"csi-node-driver-pt9zn\" (UID: \"a1c914fd-f7a4-4351-b87f-b130b6eea600\") " pod="calico-system/csi-node-driver-pt9zn" May 17 00:35:48.661177 kubelet[1534]: I0517 00:35:48.660828 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sq5cr\" (UniqueName: \"kubernetes.io/projected/fb73bc92-60e0-4007-bc34-839eddf9459f-kube-api-access-sq5cr\") pod \"kube-proxy-8qsmz\" (UID: \"fb73bc92-60e0-4007-bc34-839eddf9459f\") " pod="kube-system/kube-proxy-8qsmz" May 17 00:35:48.661177 kubelet[1534]: I0517 00:35:48.660857 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/83fe66b1-014d-4691-8ea1-458687f40746-cni-log-dir\") pod \"calico-node-r6mk6\" (UID: \"83fe66b1-014d-4691-8ea1-458687f40746\") " pod="calico-system/calico-node-r6mk6" May 17 00:35:48.661177 kubelet[1534]: I0517 00:35:48.660900 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/83fe66b1-014d-4691-8ea1-458687f40746-flexvol-driver-host\") pod \"calico-node-r6mk6\" (UID: \"83fe66b1-014d-4691-8ea1-458687f40746\") " pod="calico-system/calico-node-r6mk6" May 17 00:35:48.661177 kubelet[1534]: I0517 00:35:48.660975 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/a1c914fd-f7a4-4351-b87f-b130b6eea600-kubelet-dir\") pod \"csi-node-driver-pt9zn\" (UID: \"a1c914fd-f7a4-4351-b87f-b130b6eea600\") " pod="calico-system/csi-node-driver-pt9zn" May 17 00:35:48.661177 kubelet[1534]: I0517 00:35:48.661018 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/a1c914fd-f7a4-4351-b87f-b130b6eea600-socket-dir\") pod \"csi-node-driver-pt9zn\" (UID: \"a1c914fd-f7a4-4351-b87f-b130b6eea600\") " pod="calico-system/csi-node-driver-pt9zn" May 17 00:35:48.661446 kubelet[1534]: I0517 00:35:48.661050 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/fb73bc92-60e0-4007-bc34-839eddf9459f-kube-proxy\") pod \"kube-proxy-8qsmz\" (UID: \"fb73bc92-60e0-4007-bc34-839eddf9459f\") " pod="kube-system/kube-proxy-8qsmz" May 17 00:35:48.661446 kubelet[1534]: I0517 00:35:48.661099 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/fb73bc92-60e0-4007-bc34-839eddf9459f-lib-modules\") pod \"kube-proxy-8qsmz\" (UID: \"fb73bc92-60e0-4007-bc34-839eddf9459f\") " pod="kube-system/kube-proxy-8qsmz" May 17 00:35:48.661446 kubelet[1534]: I0517 00:35:48.661146 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/83fe66b1-014d-4691-8ea1-458687f40746-node-certs\") pod \"calico-node-r6mk6\" (UID: \"83fe66b1-014d-4691-8ea1-458687f40746\") " pod="calico-system/calico-node-r6mk6" May 17 00:35:48.661446 kubelet[1534]: I0517 00:35:48.661181 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/83fe66b1-014d-4691-8ea1-458687f40746-var-run-calico\") pod \"calico-node-r6mk6\" (UID: \"83fe66b1-014d-4691-8ea1-458687f40746\") " pod="calico-system/calico-node-r6mk6" May 17 00:35:48.661446 kubelet[1534]: I0517 00:35:48.661213 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/83fe66b1-014d-4691-8ea1-458687f40746-policysync\") pod \"calico-node-r6mk6\" (UID: \"83fe66b1-014d-4691-8ea1-458687f40746\") " pod="calico-system/calico-node-r6mk6" May 17 00:35:48.661720 kubelet[1534]: I0517 00:35:48.661242 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/83fe66b1-014d-4691-8ea1-458687f40746-var-lib-calico\") pod \"calico-node-r6mk6\" (UID: \"83fe66b1-014d-4691-8ea1-458687f40746\") " pod="calico-system/calico-node-r6mk6" May 17 00:35:48.763458 kubelet[1534]: I0517 00:35:48.763406 1534 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:35:48.776886 kubelet[1534]: E0517 00:35:48.776290 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:48.776886 kubelet[1534]: W0517 00:35:48.776318 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:48.776886 kubelet[1534]: E0517 00:35:48.776375 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:48.787222 kubelet[1534]: E0517 00:35:48.787191 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:48.787423 kubelet[1534]: W0517 00:35:48.787397 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:48.787550 kubelet[1534]: E0517 00:35:48.787527 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:48.806359 kubelet[1534]: E0517 00:35:48.806273 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:48.806689 kubelet[1534]: W0517 00:35:48.806612 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:48.808739 kubelet[1534]: E0517 00:35:48.808685 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:48.810866 kubelet[1534]: E0517 00:35:48.810826 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:48.810866 kubelet[1534]: W0517 00:35:48.810849 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:48.811077 kubelet[1534]: E0517 00:35:48.810882 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:48.942254 env[1204]: time="2025-05-17T00:35:48.942186191Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-r6mk6,Uid:83fe66b1-014d-4691-8ea1-458687f40746,Namespace:calico-system,Attempt:0,}" May 17 00:35:48.949076 env[1204]: time="2025-05-17T00:35:48.949012858Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8qsmz,Uid:fb73bc92-60e0-4007-bc34-839eddf9459f,Namespace:kube-system,Attempt:0,}" May 17 00:35:49.481882 env[1204]: time="2025-05-17T00:35:49.481813603Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:49.483717 env[1204]: time="2025-05-17T00:35:49.483668611Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:49.486556 env[1204]: time="2025-05-17T00:35:49.486508751Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:49.489054 env[1204]: time="2025-05-17T00:35:49.489017428Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:49.491678 env[1204]: time="2025-05-17T00:35:49.491616395Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:49.495035 env[1204]: time="2025-05-17T00:35:49.494971892Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:49.497692 env[1204]: time="2025-05-17T00:35:49.497614678Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:49.499041 env[1204]: time="2025-05-17T00:35:49.498996987Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:49.537828 env[1204]: time="2025-05-17T00:35:49.537741028Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:35:49.538146 env[1204]: time="2025-05-17T00:35:49.538095941Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:35:49.538359 env[1204]: time="2025-05-17T00:35:49.538318536Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:35:49.540688 env[1204]: time="2025-05-17T00:35:49.540609653Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2f590dbc4878ce69ff6426e4120c500be4f25295ec45fe332ec1e5e20331109e pid=1593 runtime=io.containerd.runc.v2 May 17 00:35:49.541345 env[1204]: time="2025-05-17T00:35:49.541269607Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:35:49.541609 env[1204]: time="2025-05-17T00:35:49.541538220Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:35:49.541813 env[1204]: time="2025-05-17T00:35:49.541760104Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:35:49.542294 env[1204]: time="2025-05-17T00:35:49.542227374Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2ce26d435bbf0e442ef1e5cb22b51dc504dd99ed94b54e4465f91b2666e85139 pid=1605 runtime=io.containerd.runc.v2 May 17 00:35:49.577835 systemd[1]: Started cri-containerd-2ce26d435bbf0e442ef1e5cb22b51dc504dd99ed94b54e4465f91b2666e85139.scope. May 17 00:35:49.583785 systemd[1]: Started cri-containerd-2f590dbc4878ce69ff6426e4120c500be4f25295ec45fe332ec1e5e20331109e.scope. May 17 00:35:49.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.612323 kernel: kauditd_printk_skb: 277 callbacks suppressed May 17 00:35:49.612456 kernel: audit: type=1400 audit(1747442149.605:438): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.617983 kubelet[1534]: E0517 00:35:49.617855 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:35:49.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.653302 kernel: audit: type=1400 audit(1747442149.605:439): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.674298 kernel: audit: type=1400 audit(1747442149.617:440): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.696103 kernel: audit: type=1400 audit(1747442149.617:441): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.738350 kernel: audit: type=1400 audit(1747442149.617:442): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.738537 kernel: audit: type=1400 audit(1747442149.617:443): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.740791 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:35:49.766058 kernel: audit: type=1400 audit(1747442149.617:444): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.766190 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:35:49.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.794458 kernel: audit: type=1400 audit(1747442149.617:445): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.783615 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2003036356.mount: Deactivated successfully. May 17 00:35:49.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.652000 audit: BPF prog-id=61 op=LOAD May 17 00:35:49.652000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.652000 audit[1619]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1605 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:49.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263653236643433356262663065343432656631653563623232623531 May 17 00:35:49.652000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.652000 audit[1619]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1605 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:49.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263653236643433356262663065343432656631653563623232623531 May 17 00:35:49.652000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.652000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.652000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.652000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.652000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.652000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.652000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.652000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.652000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.652000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.652000 audit: BPF prog-id=62 op=LOAD May 17 00:35:49.652000 audit[1619]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00026ee60 items=0 ppid=1605 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:49.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263653236643433356262663065343432656631653563623232623531 May 17 00:35:49.673000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.673000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.673000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.673000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.673000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.673000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.673000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.673000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.673000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.673000 audit: BPF prog-id=63 op=LOAD May 17 00:35:49.673000 audit[1619]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002931b8 items=0 ppid=1605 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:49.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263653236643433356262663065343432656631653563623232623531 May 17 00:35:49.674000 audit: BPF prog-id=63 op=UNLOAD May 17 00:35:49.674000 audit: BPF prog-id=62 op=UNLOAD May 17 00:35:49.674000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.674000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.674000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.674000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.674000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.674000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.674000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.674000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.674000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.716000 audit: BPF prog-id=64 op=LOAD May 17 00:35:49.737000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.737000 audit[1617]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1593 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:49.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266353930646263343837386365363966663634323665343132306335 May 17 00:35:49.674000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:49.674000 audit: BPF prog-id=65 op=LOAD May 17 00:35:49.674000 audit[1619]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0002935c8 items=0 ppid=1605 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:49.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263653236643433356262663065343432656631653563623232623531 May 17 00:35:49.822215 kubelet[1534]: E0517 00:35:49.822151 1534 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pt9zn" podUID="a1c914fd-f7a4-4351-b87f-b130b6eea600" May 17 00:35:49.831835 env[1204]: time="2025-05-17T00:35:49.830475320Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8qsmz,Uid:fb73bc92-60e0-4007-bc34-839eddf9459f,Namespace:kube-system,Attempt:0,} returns sandbox id \"2f590dbc4878ce69ff6426e4120c500be4f25295ec45fe332ec1e5e20331109e\"" May 17 00:35:49.834108 env[1204]: time="2025-05-17T00:35:49.834027435Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.5\"" May 17 00:35:49.843806 env[1204]: time="2025-05-17T00:35:49.843747451Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-r6mk6,Uid:83fe66b1-014d-4691-8ea1-458687f40746,Namespace:calico-system,Attempt:0,} returns sandbox id \"2ce26d435bbf0e442ef1e5cb22b51dc504dd99ed94b54e4465f91b2666e85139\"" May 17 00:35:50.618650 kubelet[1534]: E0517 00:35:50.618578 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:35:51.444817 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2563305534.mount: Deactivated successfully. May 17 00:35:51.620095 kubelet[1534]: E0517 00:35:51.620037 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:35:51.822078 kubelet[1534]: E0517 00:35:51.821638 1534 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pt9zn" podUID="a1c914fd-f7a4-4351-b87f-b130b6eea600" May 17 00:35:52.254272 env[1204]: time="2025-05-17T00:35:52.254192235Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:52.257054 env[1204]: time="2025-05-17T00:35:52.256996762Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:52.259225 env[1204]: time="2025-05-17T00:35:52.259173689Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:52.261320 env[1204]: time="2025-05-17T00:35:52.261272263Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9dc6553459c3319525ba4090a780db1a133d5dee68c08e07f9b9d6ba83b42a0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:52.262024 env[1204]: time="2025-05-17T00:35:52.261981185Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.5\" returns image reference \"sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363\"" May 17 00:35:52.264417 env[1204]: time="2025-05-17T00:35:52.264375933Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:35:52.266044 env[1204]: time="2025-05-17T00:35:52.265985586Z" level=info msg="CreateContainer within sandbox \"2f590dbc4878ce69ff6426e4120c500be4f25295ec45fe332ec1e5e20331109e\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:35:52.290718 env[1204]: time="2025-05-17T00:35:52.290648128Z" level=info msg="CreateContainer within sandbox \"2f590dbc4878ce69ff6426e4120c500be4f25295ec45fe332ec1e5e20331109e\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"f9aceec75640781c76a52e9f668483bd95ebc44d8193062df4e1d1710d180a12\"" May 17 00:35:52.291702 env[1204]: time="2025-05-17T00:35:52.291652507Z" level=info msg="StartContainer for \"f9aceec75640781c76a52e9f668483bd95ebc44d8193062df4e1d1710d180a12\"" May 17 00:35:52.337396 systemd[1]: run-containerd-runc-k8s.io-f9aceec75640781c76a52e9f668483bd95ebc44d8193062df4e1d1710d180a12-runc.YXlAj8.mount: Deactivated successfully. May 17 00:35:52.343707 systemd[1]: Started cri-containerd-f9aceec75640781c76a52e9f668483bd95ebc44d8193062df4e1d1710d180a12.scope. May 17 00:35:52.367000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f208541abd8 items=0 ppid=1593 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639616365656337353634303738316337366135326539663636383438 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit: BPF prog-id=69 op=LOAD May 17 00:35:52.367000 audit[1678]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a0e78 items=0 ppid=1593 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639616365656337353634303738316337366135326539663636383438 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit: BPF prog-id=70 op=LOAD May 17 00:35:52.367000 audit[1678]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a0ec8 items=0 ppid=1593 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639616365656337353634303738316337366135326539663636383438 May 17 00:35:52.367000 audit: BPF prog-id=70 op=UNLOAD May 17 00:35:52.367000 audit: BPF prog-id=69 op=UNLOAD May 17 00:35:52.367000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:52.367000 audit: BPF prog-id=71 op=LOAD May 17 00:35:52.367000 audit[1678]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a0f58 items=0 ppid=1593 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639616365656337353634303738316337366135326539663636383438 May 17 00:35:52.397252 env[1204]: time="2025-05-17T00:35:52.397135907Z" level=info msg="StartContainer for \"f9aceec75640781c76a52e9f668483bd95ebc44d8193062df4e1d1710d180a12\" returns successfully" May 17 00:35:52.555000 audit[1741]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:52.555000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe64a570e0 a2=0 a3=7ffe64a570cc items=0 ppid=1690 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.555000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:35:52.557000 audit[1743]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:52.557000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5ea61d60 a2=0 a3=7ffd5ea61d4c items=0 ppid=1690 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.557000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:35:52.560000 audit[1744]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:52.560000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc2962d40 a2=0 a3=7fffc2962d2c items=0 ppid=1690 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.560000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:35:52.560000 audit[1742]: NETFILTER_CFG table=mangle:17 family=10 entries=1 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.560000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffde102cf40 a2=0 a3=7ffde102cf2c items=0 ppid=1690 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.560000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:35:52.563000 audit[1745]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.563000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff85f077d0 a2=0 a3=7fff85f077bc items=0 ppid=1690 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.563000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:35:52.565000 audit[1746]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.565000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5a358450 a2=0 a3=7fff5a35843c items=0 ppid=1690 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.565000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:35:52.620823 kubelet[1534]: E0517 00:35:52.620770 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:35:52.664000 audit[1747]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:52.664000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcdceb3ac0 a2=0 a3=7ffcdceb3aac items=0 ppid=1690 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.664000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:35:52.670000 audit[1749]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:52.670000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffe3f88830 a2=0 a3=7fffe3f8881c items=0 ppid=1690 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.670000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:35:52.677000 audit[1752]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:52.677000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe3896d710 a2=0 a3=7ffe3896d6fc items=0 ppid=1690 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.677000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:35:52.679000 audit[1753]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:52.679000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeeafd6fd0 a2=0 a3=7ffeeafd6fbc items=0 ppid=1690 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.679000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:35:52.684000 audit[1755]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:52.684000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe10697c90 a2=0 a3=7ffe10697c7c items=0 ppid=1690 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.684000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:35:52.686000 audit[1756]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:52.686000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee9c99550 a2=0 a3=7ffee9c9953c items=0 ppid=1690 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.686000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:35:52.690000 audit[1758]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:52.690000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd550b8b70 a2=0 a3=7ffd550b8b5c items=0 ppid=1690 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.690000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:35:52.695000 audit[1761]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:52.695000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc7bac62f0 a2=0 a3=7ffc7bac62dc items=0 ppid=1690 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.695000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:35:52.697000 audit[1762]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:52.697000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1a2ba740 a2=0 a3=7ffe1a2ba72c items=0 ppid=1690 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.697000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:35:52.703000 audit[1764]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:52.703000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe6494ba40 a2=0 a3=7ffe6494ba2c items=0 ppid=1690 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.703000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:35:52.705000 audit[1765]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:52.705000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8570ee20 a2=0 a3=7ffc8570ee0c items=0 ppid=1690 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.705000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:35:52.709000 audit[1767]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:52.709000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc7966e40 a2=0 a3=7ffdc7966e2c items=0 ppid=1690 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.709000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:35:52.715000 audit[1770]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:52.715000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffebc6b7880 a2=0 a3=7ffebc6b786c items=0 ppid=1690 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.715000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:35:52.722000 audit[1773]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:52.722000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe62b04110 a2=0 a3=7ffe62b040fc items=0 ppid=1690 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.722000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:35:52.724000 audit[1774]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:52.724000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd61576fe0 a2=0 a3=7ffd61576fcc items=0 ppid=1690 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.724000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:35:52.728000 audit[1776]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:52.728000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff22eedf90 a2=0 a3=7fff22eedf7c items=0 ppid=1690 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.728000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:35:52.759000 audit[1780]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:52.759000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc8613f740 a2=0 a3=7ffc8613f72c items=0 ppid=1690 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.759000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:35:52.761000 audit[1781]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:52.761000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1ac0f520 a2=0 a3=7ffd1ac0f50c items=0 ppid=1690 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.761000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:35:52.764000 audit[1783]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:52.764000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe6ada6990 a2=0 a3=7ffe6ada697c items=0 ppid=1690 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.764000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:35:52.804000 audit[1789]: NETFILTER_CFG table=filter:39 family=2 entries=7 op=nft_register_rule pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:52.804000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc1f669be0 a2=0 a3=7ffc1f669bcc items=0 ppid=1690 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.804000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:52.836000 audit[1789]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:52.836000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffc1f669be0 a2=0 a3=7ffc1f669bcc items=0 ppid=1690 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.836000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:52.861000 audit[1798]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.861000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe5ee45780 a2=0 a3=7ffe5ee4576c items=0 ppid=1690 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.861000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:35:52.865877 kubelet[1534]: I0517 00:35:52.865763 1534 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-8qsmz" podStartSLOduration=3.435297013 podStartE2EDuration="5.865727394s" podCreationTimestamp="2025-05-17 00:35:47 +0000 UTC" firstStartedPulling="2025-05-17 00:35:49.833363599 +0000 UTC m=+4.222887026" lastFinishedPulling="2025-05-17 00:35:52.263793965 +0000 UTC m=+6.653317407" observedRunningTime="2025-05-17 00:35:52.864561682 +0000 UTC m=+7.254085133" watchObservedRunningTime="2025-05-17 00:35:52.865727394 +0000 UTC m=+7.255251155" May 17 00:35:52.866000 audit[1800]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.866000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe87bb7eb0 a2=0 a3=7ffe87bb7e9c items=0 ppid=1690 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.866000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:35:52.877000 audit[1803]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1803 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.877000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc035d3f50 a2=0 a3=7ffc035d3f3c items=0 ppid=1690 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.877000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:35:52.880000 audit[1804]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.880000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebfd55740 a2=0 a3=7ffebfd5572c items=0 ppid=1690 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.880000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:35:52.884000 audit[1806]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.884000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe0df215f0 a2=0 a3=7ffe0df215dc items=0 ppid=1690 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.884000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:35:52.886000 audit[1807]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.886000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4bd7c5f0 a2=0 a3=7ffd4bd7c5dc items=0 ppid=1690 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.886000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:35:52.890000 audit[1809]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.890000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcb73957e0 a2=0 a3=7ffcb73957cc items=0 ppid=1690 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.890000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:35:52.897000 audit[1812]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1812 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.897000 audit[1812]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffeb98c8e80 a2=0 a3=7ffeb98c8e6c items=0 ppid=1690 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.897000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:35:52.899000 audit[1813]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1813 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.899000 audit[1813]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc51137400 a2=0 a3=7ffc511373ec items=0 ppid=1690 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.899000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:35:52.905558 kubelet[1534]: E0517 00:35:52.904385 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:52.905558 kubelet[1534]: W0517 00:35:52.904444 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:52.905558 kubelet[1534]: E0517 00:35:52.904481 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:52.905558 kubelet[1534]: E0517 00:35:52.905213 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:52.905558 kubelet[1534]: W0517 00:35:52.905232 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:52.905558 kubelet[1534]: E0517 00:35:52.905254 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:52.906082 kubelet[1534]: E0517 00:35:52.905617 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:52.906082 kubelet[1534]: W0517 00:35:52.905634 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:52.906082 kubelet[1534]: E0517 00:35:52.905653 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:52.906283 kubelet[1534]: E0517 00:35:52.906085 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:52.906283 kubelet[1534]: W0517 00:35:52.906113 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:52.906283 kubelet[1534]: E0517 00:35:52.906133 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:52.904000 audit[1815]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1815 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.904000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff750662e0 a2=0 a3=7fff750662cc items=0 ppid=1690 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.904000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:35:52.906954 kubelet[1534]: E0517 00:35:52.906501 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:52.906954 kubelet[1534]: W0517 00:35:52.906530 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:52.906954 kubelet[1534]: E0517 00:35:52.906549 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:52.907179 kubelet[1534]: E0517 00:35:52.906894 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:52.907179 kubelet[1534]: W0517 00:35:52.907006 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:52.907179 kubelet[1534]: E0517 00:35:52.907024 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:52.907419 kubelet[1534]: E0517 00:35:52.907384 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:52.907498 kubelet[1534]: W0517 00:35:52.907422 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:52.907498 kubelet[1534]: E0517 00:35:52.907442 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:52.907842 kubelet[1534]: E0517 00:35:52.907809 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:52.907964 kubelet[1534]: W0517 00:35:52.907843 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:52.907964 kubelet[1534]: E0517 00:35:52.907862 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:52.908308 kubelet[1534]: E0517 00:35:52.908282 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:52.908439 kubelet[1534]: W0517 00:35:52.908315 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:52.908439 kubelet[1534]: E0517 00:35:52.908334 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:52.908976 kubelet[1534]: E0517 00:35:52.908704 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:52.908976 kubelet[1534]: W0517 00:35:52.908734 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:52.908976 kubelet[1534]: E0517 00:35:52.908751 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:52.910000 audit[1827]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1827 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.910000 audit[1827]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc247f20b0 a2=0 a3=7ffc247f209c items=0 ppid=1690 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.910000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:35:52.913134 kubelet[1534]: E0517 00:35:52.909476 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:52.913134 kubelet[1534]: W0517 00:35:52.909494 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:52.913134 kubelet[1534]: E0517 00:35:52.909512 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:52.913134 kubelet[1534]: E0517 00:35:52.910022 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:52.913134 kubelet[1534]: W0517 00:35:52.910042 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:52.913134 kubelet[1534]: E0517 00:35:52.910061 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:52.913134 kubelet[1534]: E0517 00:35:52.910435 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:52.913134 kubelet[1534]: W0517 00:35:52.910463 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:52.913134 kubelet[1534]: E0517 00:35:52.910481 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:52.913134 kubelet[1534]: E0517 00:35:52.910850 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:52.913785 kubelet[1534]: W0517 00:35:52.910864 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:52.913785 kubelet[1534]: E0517 00:35:52.910882 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:52.913785 kubelet[1534]: E0517 00:35:52.911213 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:52.913785 kubelet[1534]: W0517 00:35:52.911227 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:52.913785 kubelet[1534]: E0517 00:35:52.911256 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:52.913785 kubelet[1534]: E0517 00:35:52.911622 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:52.913785 kubelet[1534]: W0517 00:35:52.911637 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:52.913785 kubelet[1534]: E0517 00:35:52.911656 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:52.913785 kubelet[1534]: E0517 00:35:52.912145 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:52.913785 kubelet[1534]: W0517 00:35:52.912160 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:52.914548 kubelet[1534]: E0517 00:35:52.912175 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:52.914548 kubelet[1534]: E0517 00:35:52.912529 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:52.914548 kubelet[1534]: W0517 00:35:52.912545 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:52.914548 kubelet[1534]: E0517 00:35:52.912566 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:52.915676 kubelet[1534]: E0517 00:35:52.915058 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:52.915676 kubelet[1534]: W0517 00:35:52.915077 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:52.915676 kubelet[1534]: E0517 00:35:52.915097 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:52.915676 kubelet[1534]: E0517 00:35:52.915470 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:52.915676 kubelet[1534]: W0517 00:35:52.915485 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:52.915676 kubelet[1534]: E0517 00:35:52.915503 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:52.916000 audit[1838]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1838 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.916000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcb5f497e0 a2=0 a3=7ffcb5f497cc items=0 ppid=1690 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.916000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:35:52.922000 audit[1841]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.922000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe001eaec0 a2=0 a3=7ffe001eaeac items=0 ppid=1690 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.922000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:35:52.927000 audit[1844]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1844 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.927000 audit[1844]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd9adac8e0 a2=0 a3=7ffd9adac8cc items=0 ppid=1690 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.927000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:35:52.930000 audit[1845]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1845 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.930000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffac355b60 a2=0 a3=7fffac355b4c items=0 ppid=1690 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.930000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:35:52.934000 audit[1847]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1847 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.934000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe4ff4dd10 a2=0 a3=7ffe4ff4dcfc items=0 ppid=1690 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.934000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:35:52.939000 audit[1850]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1850 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.939000 audit[1850]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdbdf19c00 a2=0 a3=7ffdbdf19bec items=0 ppid=1690 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.939000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:35:52.941000 audit[1851]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1851 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.941000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7df00840 a2=0 a3=7fff7df0082c items=0 ppid=1690 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.941000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:35:52.945000 audit[1853]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1853 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.945000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff11cd80c0 a2=0 a3=7fff11cd80ac items=0 ppid=1690 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.945000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:35:52.948000 audit[1854]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1854 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.948000 audit[1854]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdeee113f0 a2=0 a3=7ffdeee113dc items=0 ppid=1690 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.948000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:35:52.952000 audit[1856]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1856 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.952000 audit[1856]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc7643b0b0 a2=0 a3=7ffc7643b09c items=0 ppid=1690 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.952000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:35:52.958000 audit[1859]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1859 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:52.958000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd5be7aff0 a2=0 a3=7ffd5be7afdc items=0 ppid=1690 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.958000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:35:52.963000 audit[1861]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1861 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:35:52.963000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffde193ddf0 a2=0 a3=7ffde193dddc items=0 ppid=1690 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.963000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:52.964000 audit[1861]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1861 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:35:52.964000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffde193ddf0 a2=0 a3=7ffde193dddc items=0 ppid=1690 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:52.964000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:53.004852 kubelet[1534]: E0517 00:35:53.004806 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:53.004852 kubelet[1534]: W0517 00:35:53.004845 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:53.005120 kubelet[1534]: E0517 00:35:53.004876 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:53.006885 kubelet[1534]: E0517 00:35:53.006842 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:53.006885 kubelet[1534]: W0517 00:35:53.006884 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:53.007160 kubelet[1534]: E0517 00:35:53.006941 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:53.007367 kubelet[1534]: E0517 00:35:53.007339 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:53.007446 kubelet[1534]: W0517 00:35:53.007370 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:53.008037 kubelet[1534]: E0517 00:35:53.007993 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:53.008162 kubelet[1534]: W0517 00:35:53.008030 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:53.008162 kubelet[1534]: E0517 00:35:53.008063 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:53.008398 kubelet[1534]: E0517 00:35:53.008373 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:53.008479 kubelet[1534]: W0517 00:35:53.008410 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:53.008479 kubelet[1534]: E0517 00:35:53.008432 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:53.008758 kubelet[1534]: E0517 00:35:53.008730 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:53.008871 kubelet[1534]: W0517 00:35:53.008755 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:53.008871 kubelet[1534]: E0517 00:35:53.008787 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:53.009173 kubelet[1534]: E0517 00:35:53.009147 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:53.009270 kubelet[1534]: W0517 00:35:53.009183 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:53.009270 kubelet[1534]: E0517 00:35:53.009204 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:53.009881 kubelet[1534]: E0517 00:35:53.009853 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:53.009996 kubelet[1534]: W0517 00:35:53.009881 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:53.009996 kubelet[1534]: E0517 00:35:53.009932 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:53.011109 kubelet[1534]: E0517 00:35:53.011078 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:53.011444 kubelet[1534]: E0517 00:35:53.011419 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:53.011533 kubelet[1534]: W0517 00:35:53.011446 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:53.011533 kubelet[1534]: E0517 00:35:53.011481 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:53.011808 kubelet[1534]: E0517 00:35:53.011785 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:53.011889 kubelet[1534]: W0517 00:35:53.011811 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:53.011889 kubelet[1534]: E0517 00:35:53.011831 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:53.012212 kubelet[1534]: E0517 00:35:53.012188 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:53.012288 kubelet[1534]: W0517 00:35:53.012213 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:53.012288 kubelet[1534]: E0517 00:35:53.012234 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:53.012867 kubelet[1534]: E0517 00:35:53.012840 1534 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:53.012988 kubelet[1534]: W0517 00:35:53.012867 1534 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:53.012988 kubelet[1534]: E0517 00:35:53.012895 1534 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:53.300648 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3900416838.mount: Deactivated successfully. May 17 00:35:53.439354 env[1204]: time="2025-05-17T00:35:53.439273729Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:53.442528 env[1204]: time="2025-05-17T00:35:53.442470146Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:53.444702 env[1204]: time="2025-05-17T00:35:53.444652451Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:53.446702 env[1204]: time="2025-05-17T00:35:53.446660269Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:53.447445 env[1204]: time="2025-05-17T00:35:53.447377507Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 00:35:53.451280 env[1204]: time="2025-05-17T00:35:53.451221673Z" level=info msg="CreateContainer within sandbox \"2ce26d435bbf0e442ef1e5cb22b51dc504dd99ed94b54e4465f91b2666e85139\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:35:53.471281 env[1204]: time="2025-05-17T00:35:53.471213325Z" level=info msg="CreateContainer within sandbox \"2ce26d435bbf0e442ef1e5cb22b51dc504dd99ed94b54e4465f91b2666e85139\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"32659150fd124c56da64c321e60bb12b72d2c1da3120ced7f486ec55366efd78\"" May 17 00:35:53.472255 env[1204]: time="2025-05-17T00:35:53.472207322Z" level=info msg="StartContainer for \"32659150fd124c56da64c321e60bb12b72d2c1da3120ced7f486ec55366efd78\"" May 17 00:35:53.511106 systemd[1]: Started cri-containerd-32659150fd124c56da64c321e60bb12b72d2c1da3120ced7f486ec55366efd78.scope. May 17 00:35:53.537000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f6462240248 items=0 ppid=1605 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:53.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332363539313530666431323463353664613634633332316536306262 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit: BPF prog-id=72 op=LOAD May 17 00:35:53.537000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000263ea8 items=0 ppid=1605 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:53.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332363539313530666431323463353664613634633332316536306262 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit: BPF prog-id=73 op=LOAD May 17 00:35:53.537000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000263ef8 items=0 ppid=1605 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:53.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332363539313530666431323463353664613634633332316536306262 May 17 00:35:53.537000 audit: BPF prog-id=73 op=UNLOAD May 17 00:35:53.537000 audit: BPF prog-id=72 op=UNLOAD May 17 00:35:53.537000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { perfmon } for pid=1881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit[1881]: AVC avc: denied { bpf } for pid=1881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:53.537000 audit: BPF prog-id=74 op=LOAD May 17 00:35:53.537000 audit[1881]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000263f88 items=0 ppid=1605 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:53.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332363539313530666431323463353664613634633332316536306262 May 17 00:35:53.564114 env[1204]: time="2025-05-17T00:35:53.563038954Z" level=info msg="StartContainer for \"32659150fd124c56da64c321e60bb12b72d2c1da3120ced7f486ec55366efd78\" returns successfully" May 17 00:35:53.579186 systemd[1]: cri-containerd-32659150fd124c56da64c321e60bb12b72d2c1da3120ced7f486ec55366efd78.scope: Deactivated successfully. May 17 00:35:53.581000 audit: BPF prog-id=74 op=UNLOAD May 17 00:35:53.622017 kubelet[1534]: E0517 00:35:53.621962 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:35:53.821474 kubelet[1534]: E0517 00:35:53.821291 1534 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pt9zn" podUID="a1c914fd-f7a4-4351-b87f-b130b6eea600" May 17 00:35:54.011166 env[1204]: time="2025-05-17T00:35:54.011090872Z" level=info msg="shim disconnected" id=32659150fd124c56da64c321e60bb12b72d2c1da3120ced7f486ec55366efd78 May 17 00:35:54.011166 env[1204]: time="2025-05-17T00:35:54.011165979Z" level=warning msg="cleaning up after shim disconnected" id=32659150fd124c56da64c321e60bb12b72d2c1da3120ced7f486ec55366efd78 namespace=k8s.io May 17 00:35:54.011484 env[1204]: time="2025-05-17T00:35:54.011183399Z" level=info msg="cleaning up dead shim" May 17 00:35:54.025482 env[1204]: time="2025-05-17T00:35:54.025407934Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:35:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1928 runtime=io.containerd.runc.v2\n" May 17 00:35:54.284088 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-32659150fd124c56da64c321e60bb12b72d2c1da3120ced7f486ec55366efd78-rootfs.mount: Deactivated successfully. May 17 00:35:54.623198 kubelet[1534]: E0517 00:35:54.623037 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:35:54.854759 env[1204]: time="2025-05-17T00:35:54.854669110Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:35:55.623283 kubelet[1534]: E0517 00:35:55.623228 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:35:55.821271 kubelet[1534]: E0517 00:35:55.821196 1534 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pt9zn" podUID="a1c914fd-f7a4-4351-b87f-b130b6eea600" May 17 00:35:56.624329 kubelet[1534]: E0517 00:35:56.624248 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:35:57.625234 kubelet[1534]: E0517 00:35:57.625132 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:35:57.821886 kubelet[1534]: E0517 00:35:57.821363 1534 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pt9zn" podUID="a1c914fd-f7a4-4351-b87f-b130b6eea600" May 17 00:35:58.152723 env[1204]: time="2025-05-17T00:35:58.152643449Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:58.155372 env[1204]: time="2025-05-17T00:35:58.155292970Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:58.157759 env[1204]: time="2025-05-17T00:35:58.157706733Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:58.160047 env[1204]: time="2025-05-17T00:35:58.159999548Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:58.160776 env[1204]: time="2025-05-17T00:35:58.160690447Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 00:35:58.164234 env[1204]: time="2025-05-17T00:35:58.164174783Z" level=info msg="CreateContainer within sandbox \"2ce26d435bbf0e442ef1e5cb22b51dc504dd99ed94b54e4465f91b2666e85139\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:35:58.184224 env[1204]: time="2025-05-17T00:35:58.184119927Z" level=info msg="CreateContainer within sandbox \"2ce26d435bbf0e442ef1e5cb22b51dc504dd99ed94b54e4465f91b2666e85139\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"39169cb17c725e91b1852f98b67eb9d76409ee209cdbb2b03fae261a9ca23fa9\"" May 17 00:35:58.185031 env[1204]: time="2025-05-17T00:35:58.184987335Z" level=info msg="StartContainer for \"39169cb17c725e91b1852f98b67eb9d76409ee209cdbb2b03fae261a9ca23fa9\"" May 17 00:35:58.218077 systemd[1]: Started cri-containerd-39169cb17c725e91b1852f98b67eb9d76409ee209cdbb2b03fae261a9ca23fa9.scope. May 17 00:35:58.255000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.282351 kernel: kauditd_printk_skb: 406 callbacks suppressed May 17 00:35:58.282573 kernel: audit: type=1400 audit(1747442158.255:532): avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.315066 kernel: audit: type=1300 audit(1747442158.255:532): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7bede42e18 items=0 ppid=1605 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.255000 audit[1950]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7bede42e18 items=0 ppid=1605 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339313639636231376337323565393162313835326639386236376562 May 17 00:35:58.344187 kernel: audit: type=1327 audit(1747442158.255:532): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339313639636231376337323565393162313835326639386236376562 May 17 00:35:58.255000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.366991 kernel: audit: type=1400 audit(1747442158.255:533): avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.255000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.387945 kernel: audit: type=1400 audit(1747442158.255:533): avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.255000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.409949 kernel: audit: type=1400 audit(1747442158.255:533): avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.410125 kernel: audit: type=1400 audit(1747442158.255:533): avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.255000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.255000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.255000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.475659 kernel: audit: type=1400 audit(1747442158.255:533): avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.476026 kernel: audit: type=1400 audit(1747442158.255:533): avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.476090 kernel: audit: type=1400 audit(1747442158.255:533): avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.255000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.255000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.255000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.255000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.255000 audit: BPF prog-id=75 op=LOAD May 17 00:35:58.255000 audit[1950]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000092788 items=0 ppid=1605 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339313639636231376337323565393162313835326639386236376562 May 17 00:35:58.281000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.281000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.281000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.281000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.281000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.281000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.281000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.281000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.281000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.281000 audit: BPF prog-id=76 op=LOAD May 17 00:35:58.281000 audit[1950]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000927d8 items=0 ppid=1605 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339313639636231376337323565393162313835326639386236376562 May 17 00:35:58.281000 audit: BPF prog-id=76 op=UNLOAD May 17 00:35:58.281000 audit: BPF prog-id=75 op=UNLOAD May 17 00:35:58.281000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.281000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.281000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.281000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.281000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.281000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.281000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.281000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.281000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.281000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.281000 audit: BPF prog-id=77 op=LOAD May 17 00:35:58.281000 audit[1950]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000092868 items=0 ppid=1605 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339313639636231376337323565393162313835326639386236376562 May 17 00:35:58.500102 env[1204]: time="2025-05-17T00:35:58.497185806Z" level=info msg="StartContainer for \"39169cb17c725e91b1852f98b67eb9d76409ee209cdbb2b03fae261a9ca23fa9\" returns successfully" May 17 00:35:58.625712 kubelet[1534]: E0517 00:35:58.625632 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:35:59.492177 env[1204]: time="2025-05-17T00:35:59.492050091Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:35:59.497223 systemd[1]: cri-containerd-39169cb17c725e91b1852f98b67eb9d76409ee209cdbb2b03fae261a9ca23fa9.scope: Deactivated successfully. May 17 00:35:59.501000 audit: BPF prog-id=77 op=UNLOAD May 17 00:35:59.534337 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-39169cb17c725e91b1852f98b67eb9d76409ee209cdbb2b03fae261a9ca23fa9-rootfs.mount: Deactivated successfully. May 17 00:35:59.582996 kubelet[1534]: I0517 00:35:59.581820 1534 kubelet_node_status.go:501] "Fast updating node status as it just became ready" May 17 00:35:59.626670 kubelet[1534]: E0517 00:35:59.626595 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:35:59.828777 systemd[1]: Created slice kubepods-besteffort-poda1c914fd_f7a4_4351_b87f_b130b6eea600.slice. May 17 00:35:59.833129 env[1204]: time="2025-05-17T00:35:59.833072747Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pt9zn,Uid:a1c914fd-f7a4-4351-b87f-b130b6eea600,Namespace:calico-system,Attempt:0,}" May 17 00:36:00.088286 env[1204]: time="2025-05-17T00:36:00.087980940Z" level=info msg="shim disconnected" id=39169cb17c725e91b1852f98b67eb9d76409ee209cdbb2b03fae261a9ca23fa9 May 17 00:36:00.088286 env[1204]: time="2025-05-17T00:36:00.088189418Z" level=warning msg="cleaning up after shim disconnected" id=39169cb17c725e91b1852f98b67eb9d76409ee209cdbb2b03fae261a9ca23fa9 namespace=k8s.io May 17 00:36:00.088286 env[1204]: time="2025-05-17T00:36:00.088207274Z" level=info msg="cleaning up dead shim" May 17 00:36:00.120624 env[1204]: time="2025-05-17T00:36:00.120546559Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:36:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1996 runtime=io.containerd.runc.v2\n" May 17 00:36:00.189151 env[1204]: time="2025-05-17T00:36:00.189073758Z" level=error msg="Failed to destroy network for sandbox \"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:36:00.192442 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b-shm.mount: Deactivated successfully. May 17 00:36:00.193616 env[1204]: time="2025-05-17T00:36:00.193375743Z" level=error msg="encountered an error cleaning up failed sandbox \"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:36:00.193616 env[1204]: time="2025-05-17T00:36:00.193480179Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pt9zn,Uid:a1c914fd-f7a4-4351-b87f-b130b6eea600,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:36:00.195638 kubelet[1534]: E0517 00:36:00.195055 1534 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:36:00.195638 kubelet[1534]: E0517 00:36:00.195148 1534 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-pt9zn" May 17 00:36:00.195638 kubelet[1534]: E0517 00:36:00.195232 1534 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-pt9zn" May 17 00:36:00.196021 kubelet[1534]: E0517 00:36:00.195301 1534 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-pt9zn_calico-system(a1c914fd-f7a4-4351-b87f-b130b6eea600)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-pt9zn_calico-system(a1c914fd-f7a4-4351-b87f-b130b6eea600)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-pt9zn" podUID="a1c914fd-f7a4-4351-b87f-b130b6eea600" May 17 00:36:00.627779 kubelet[1534]: E0517 00:36:00.627704 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:00.870820 kubelet[1534]: I0517 00:36:00.870740 1534 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" May 17 00:36:00.872413 env[1204]: time="2025-05-17T00:36:00.872363121Z" level=info msg="StopPodSandbox for \"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b\"" May 17 00:36:00.876766 env[1204]: time="2025-05-17T00:36:00.876704481Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:36:00.912137 env[1204]: time="2025-05-17T00:36:00.912043246Z" level=error msg="StopPodSandbox for \"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b\" failed" error="failed to destroy network for sandbox \"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:36:00.912440 kubelet[1534]: E0517 00:36:00.912392 1534 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" May 17 00:36:00.912580 kubelet[1534]: E0517 00:36:00.912482 1534 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b"} May 17 00:36:00.912580 kubelet[1534]: E0517 00:36:00.912564 1534 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a1c914fd-f7a4-4351-b87f-b130b6eea600\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:36:00.912778 kubelet[1534]: E0517 00:36:00.912604 1534 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a1c914fd-f7a4-4351-b87f-b130b6eea600\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-pt9zn" podUID="a1c914fd-f7a4-4351-b87f-b130b6eea600" May 17 00:36:01.041165 systemd[1]: Created slice kubepods-besteffort-podbea7c7a4_5c41_4d78_a68e_195386023e27.slice. May 17 00:36:01.173833 kubelet[1534]: I0517 00:36:01.173639 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j2s5g\" (UniqueName: \"kubernetes.io/projected/bea7c7a4-5c41-4d78-a68e-195386023e27-kube-api-access-j2s5g\") pod \"nginx-deployment-7fcdb87857-2mfff\" (UID: \"bea7c7a4-5c41-4d78-a68e-195386023e27\") " pod="default/nginx-deployment-7fcdb87857-2mfff" May 17 00:36:01.348937 env[1204]: time="2025-05-17T00:36:01.348816803Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-2mfff,Uid:bea7c7a4-5c41-4d78-a68e-195386023e27,Namespace:default,Attempt:0,}" May 17 00:36:01.450614 env[1204]: time="2025-05-17T00:36:01.447361161Z" level=error msg="Failed to destroy network for sandbox \"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:36:01.450755 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365-shm.mount: Deactivated successfully. May 17 00:36:01.453136 env[1204]: time="2025-05-17T00:36:01.453044764Z" level=error msg="encountered an error cleaning up failed sandbox \"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:36:01.453316 env[1204]: time="2025-05-17T00:36:01.453162927Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-2mfff,Uid:bea7c7a4-5c41-4d78-a68e-195386023e27,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:36:01.453524 kubelet[1534]: E0517 00:36:01.453469 1534 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:36:01.453663 kubelet[1534]: E0517 00:36:01.453560 1534 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-2mfff" May 17 00:36:01.453663 kubelet[1534]: E0517 00:36:01.453612 1534 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-2mfff" May 17 00:36:01.453795 kubelet[1534]: E0517 00:36:01.453677 1534 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-2mfff_default(bea7c7a4-5c41-4d78-a68e-195386023e27)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-2mfff_default(bea7c7a4-5c41-4d78-a68e-195386023e27)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-2mfff" podUID="bea7c7a4-5c41-4d78-a68e-195386023e27" May 17 00:36:01.609521 systemd[1]: systemd-hostnamed.service: Deactivated successfully. May 17 00:36:01.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:01.628442 kubelet[1534]: E0517 00:36:01.628387 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:01.628000 audit: BPF prog-id=55 op=UNLOAD May 17 00:36:01.628000 audit: BPF prog-id=54 op=UNLOAD May 17 00:36:01.628000 audit: BPF prog-id=53 op=UNLOAD May 17 00:36:01.879149 kubelet[1534]: I0517 00:36:01.877431 1534 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" May 17 00:36:01.880226 env[1204]: time="2025-05-17T00:36:01.879961685Z" level=info msg="StopPodSandbox for \"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365\"" May 17 00:36:01.959974 env[1204]: time="2025-05-17T00:36:01.959879173Z" level=error msg="StopPodSandbox for \"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365\" failed" error="failed to destroy network for sandbox \"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:36:01.960673 kubelet[1534]: E0517 00:36:01.960436 1534 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" May 17 00:36:01.960673 kubelet[1534]: E0517 00:36:01.960500 1534 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365"} May 17 00:36:01.960673 kubelet[1534]: E0517 00:36:01.960552 1534 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bea7c7a4-5c41-4d78-a68e-195386023e27\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:36:01.960673 kubelet[1534]: E0517 00:36:01.960590 1534 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bea7c7a4-5c41-4d78-a68e-195386023e27\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-2mfff" podUID="bea7c7a4-5c41-4d78-a68e-195386023e27" May 17 00:36:02.629624 kubelet[1534]: E0517 00:36:02.629541 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:03.630732 kubelet[1534]: E0517 00:36:03.630631 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:04.631505 kubelet[1534]: E0517 00:36:04.631438 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:05.632333 kubelet[1534]: E0517 00:36:05.632227 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:06.601114 kubelet[1534]: E0517 00:36:06.601026 1534 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:06.633364 kubelet[1534]: E0517 00:36:06.633262 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:07.633570 kubelet[1534]: E0517 00:36:07.633445 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:08.465538 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount575953177.mount: Deactivated successfully. May 17 00:36:08.499204 env[1204]: time="2025-05-17T00:36:08.499127077Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:08.501763 env[1204]: time="2025-05-17T00:36:08.501687890Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:08.503953 env[1204]: time="2025-05-17T00:36:08.503882195Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:08.505942 env[1204]: time="2025-05-17T00:36:08.505878362Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:08.506696 env[1204]: time="2025-05-17T00:36:08.506619734Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 00:36:08.531676 env[1204]: time="2025-05-17T00:36:08.531610187Z" level=info msg="CreateContainer within sandbox \"2ce26d435bbf0e442ef1e5cb22b51dc504dd99ed94b54e4465f91b2666e85139\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:36:08.560611 env[1204]: time="2025-05-17T00:36:08.560529003Z" level=info msg="CreateContainer within sandbox \"2ce26d435bbf0e442ef1e5cb22b51dc504dd99ed94b54e4465f91b2666e85139\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"71580463fcc37bb69178851be173ee142b92468f8a53434f9e6f0ffb6b6eaa0b\"" May 17 00:36:08.561628 env[1204]: time="2025-05-17T00:36:08.561565174Z" level=info msg="StartContainer for \"71580463fcc37bb69178851be173ee142b92468f8a53434f9e6f0ffb6b6eaa0b\"" May 17 00:36:08.593819 systemd[1]: Started cri-containerd-71580463fcc37bb69178851be173ee142b92468f8a53434f9e6f0ffb6b6eaa0b.scope. May 17 00:36:08.622000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.629031 kernel: kauditd_printk_skb: 38 callbacks suppressed May 17 00:36:08.629230 kernel: audit: type=1400 audit(1747442168.622:543): avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.650007 kubelet[1534]: E0517 00:36:08.649962 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:08.622000 audit[2100]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f876a1cf608 items=0 ppid=1605 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.711192 kernel: audit: type=1300 audit(1747442168.622:543): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f876a1cf608 items=0 ppid=1605 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.711376 kernel: audit: type=1327 audit(1747442168.622:543): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731353830343633666363333762623639313738383531626531373365 May 17 00:36:08.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731353830343633666363333762623639313738383531626531373365 May 17 00:36:08.624000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.745043 kernel: audit: type=1400 audit(1747442168.624:544): avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.745243 kernel: audit: type=1400 audit(1747442168.624:544): avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.624000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.624000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.773878 kernel: audit: type=1400 audit(1747442168.624:544): avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.775299 kernel: audit: type=1400 audit(1747442168.624:544): avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.624000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.624000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.815567 env[1204]: time="2025-05-17T00:36:08.815483661Z" level=info msg="StartContainer for \"71580463fcc37bb69178851be173ee142b92468f8a53434f9e6f0ffb6b6eaa0b\" returns successfully" May 17 00:36:08.816026 kernel: audit: type=1400 audit(1747442168.624:544): avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.839084 kernel: audit: type=1400 audit(1747442168.624:544): avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.624000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.624000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.624000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.862095 kernel: audit: type=1400 audit(1747442168.624:544): avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.624000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.624000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.624000 audit: BPF prog-id=78 op=LOAD May 17 00:36:08.624000 audit[2100]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00032d3b8 items=0 ppid=1605 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731353830343633666363333762623639313738383531626531373365 May 17 00:36:08.648000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.648000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.648000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.648000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.648000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.648000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.648000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.648000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.648000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.648000 audit: BPF prog-id=79 op=LOAD May 17 00:36:08.648000 audit[2100]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00032d408 items=0 ppid=1605 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731353830343633666363333762623639313738383531626531373365 May 17 00:36:08.681000 audit: BPF prog-id=79 op=UNLOAD May 17 00:36:08.681000 audit: BPF prog-id=78 op=UNLOAD May 17 00:36:08.681000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.681000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.681000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.681000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.681000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.681000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.681000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.681000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.681000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.681000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:08.681000 audit: BPF prog-id=80 op=LOAD May 17 00:36:08.681000 audit[2100]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00032d498 items=0 ppid=1605 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:08.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731353830343633666363333762623639313738383531626531373365 May 17 00:36:08.919862 kubelet[1534]: I0517 00:36:08.919040 1534 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-r6mk6" podStartSLOduration=4.256619392 podStartE2EDuration="22.919014525s" podCreationTimestamp="2025-05-17 00:35:46 +0000 UTC" firstStartedPulling="2025-05-17 00:35:49.845651871 +0000 UTC m=+4.235175304" lastFinishedPulling="2025-05-17 00:36:08.508046996 +0000 UTC m=+22.897570437" observedRunningTime="2025-05-17 00:36:08.91795826 +0000 UTC m=+23.307481710" watchObservedRunningTime="2025-05-17 00:36:08.919014525 +0000 UTC m=+23.308537976" May 17 00:36:08.957399 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:36:08.957573 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:36:09.650286 kubelet[1534]: E0517 00:36:09.650209 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:09.925937 systemd[1]: run-containerd-runc-k8s.io-71580463fcc37bb69178851be173ee142b92468f8a53434f9e6f0ffb6b6eaa0b-runc.ZGmMko.mount: Deactivated successfully. May 17 00:36:10.519000 audit[2249]: AVC avc: denied { write } for pid=2249 comm="tee" name="fd" dev="proc" ino=19122 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:36:10.523000 audit[2238]: AVC avc: denied { write } for pid=2238 comm="tee" name="fd" dev="proc" ino=19125 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:36:10.523000 audit[2238]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe54c987c8 a2=241 a3=1b6 items=1 ppid=2203 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:10.523000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:36:10.523000 audit: PATH item=0 name="/dev/fd/63" inode=19111 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:10.523000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:36:10.527000 audit[2252]: AVC avc: denied { write } for pid=2252 comm="tee" name="fd" dev="proc" ino=19130 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:36:10.528000 audit[2253]: AVC avc: denied { write } for pid=2253 comm="tee" name="fd" dev="proc" ino=19133 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:36:10.535000 audit[2241]: AVC avc: denied { write } for pid=2241 comm="tee" name="fd" dev="proc" ino=19960 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:36:10.535000 audit[2241]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeef60e7c6 a2=241 a3=1b6 items=1 ppid=2204 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:10.538000 audit[2244]: AVC avc: denied { write } for pid=2244 comm="tee" name="fd" dev="proc" ino=19964 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:36:10.538000 audit[2244]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffffbb177c7 a2=241 a3=1b6 items=1 ppid=2207 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:10.519000 audit[2249]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcbee5d7b6 a2=241 a3=1b6 items=1 ppid=2217 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:10.519000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:36:10.519000 audit: PATH item=0 name="/dev/fd/63" inode=19115 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:10.519000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:36:10.528000 audit[2253]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd184f37b7 a2=241 a3=1b6 items=1 ppid=2208 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:10.527000 audit[2252]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc6de8c7c6 a2=241 a3=1b6 items=1 ppid=2211 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:10.527000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:36:10.527000 audit: PATH item=0 name="/dev/fd/63" inode=19116 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:10.528000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:36:10.527000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:36:10.528000 audit: PATH item=0 name="/dev/fd/63" inode=19955 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:10.528000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:36:10.535000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:36:10.535000 audit: PATH item=0 name="/dev/fd/63" inode=19114 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:10.535000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:36:10.538000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:36:10.538000 audit: PATH item=0 name="/dev/fd/63" inode=19953 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:10.538000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:36:10.546000 audit[2262]: AVC avc: denied { write } for pid=2262 comm="tee" name="fd" dev="proc" ino=19969 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:36:10.546000 audit[2262]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff328cd7c6 a2=241 a3=1b6 items=1 ppid=2220 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:10.546000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:36:10.546000 audit: PATH item=0 name="/dev/fd/63" inode=19119 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:10.546000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:36:10.650786 kubelet[1534]: E0517 00:36:10.650736 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:10.941000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.941000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.941000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.941000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.941000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.941000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.941000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.941000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.941000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.941000 audit: BPF prog-id=81 op=LOAD May 17 00:36:10.941000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc9d0a8c30 a2=98 a3=3 items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:10.941000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:10.942000 audit: BPF prog-id=81 op=UNLOAD May 17 00:36:10.942000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.942000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.942000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.942000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.942000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.942000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.942000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.942000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.942000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.942000 audit: BPF prog-id=82 op=LOAD May 17 00:36:10.942000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9d0a8a20 a2=94 a3=54428f items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:10.942000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:10.942000 audit: BPF prog-id=82 op=UNLOAD May 17 00:36:10.942000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.942000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.942000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.942000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.942000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.942000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.942000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.942000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.942000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:10.942000 audit: BPF prog-id=83 op=LOAD May 17 00:36:10.942000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9d0a8a50 a2=94 a3=2 items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:10.942000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:10.942000 audit: BPF prog-id=83 op=UNLOAD May 17 00:36:11.080000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.080000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.080000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.080000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.080000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.080000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.080000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.080000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.080000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.080000 audit: BPF prog-id=84 op=LOAD May 17 00:36:11.080000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9d0a8910 a2=94 a3=1 items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:11.080000 audit: BPF prog-id=84 op=UNLOAD May 17 00:36:11.080000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.080000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc9d0a89e0 a2=50 a3=7ffc9d0a8ac0 items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:11.092000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.092000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9d0a8920 a2=28 a3=0 items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:11.092000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.092000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9d0a8950 a2=28 a3=0 items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:11.092000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.092000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9d0a8860 a2=28 a3=0 items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:11.092000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.092000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9d0a8970 a2=28 a3=0 items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:11.092000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.092000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9d0a8950 a2=28 a3=0 items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:11.093000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9d0a8940 a2=28 a3=0 items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.093000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:11.093000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9d0a8970 a2=28 a3=0 items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.093000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:11.093000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9d0a8950 a2=28 a3=0 items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.093000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:11.093000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9d0a8970 a2=28 a3=0 items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.093000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:11.093000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9d0a8940 a2=28 a3=0 items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.093000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:11.093000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9d0a89b0 a2=28 a3=0 items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.093000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:11.093000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc9d0a8760 a2=50 a3=1 items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.093000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:11.093000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit: BPF prog-id=85 op=LOAD May 17 00:36:11.093000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc9d0a8760 a2=94 a3=5 items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.093000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:11.093000 audit: BPF prog-id=85 op=UNLOAD May 17 00:36:11.093000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc9d0a8810 a2=50 a3=1 items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.093000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:11.093000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc9d0a8930 a2=4 a3=38 items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.093000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:11.093000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.093000 audit[2309]: AVC avc: denied { confidentiality } for pid=2309 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:11.093000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9d0a8980 a2=94 a3=6 items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.093000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:11.094000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.094000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.094000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.094000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.094000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.094000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.094000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.094000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.094000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.094000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.094000 audit[2309]: AVC avc: denied { confidentiality } for pid=2309 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:11.094000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9d0a8130 a2=94 a3=88 items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.094000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:11.094000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.094000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.094000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.094000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.094000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.094000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.094000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.094000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.094000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.094000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.094000 audit[2309]: AVC avc: denied { confidentiality } for pid=2309 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:11.094000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9d0a8130 a2=94 a3=88 items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.094000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:36:11.108000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit: BPF prog-id=86 op=LOAD May 17 00:36:11.108000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb3ca9b30 a2=98 a3=1999999999999999 items=0 ppid=2206 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.108000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:36:11.108000 audit: BPF prog-id=86 op=UNLOAD May 17 00:36:11.108000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit: BPF prog-id=87 op=LOAD May 17 00:36:11.108000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb3ca9a10 a2=94 a3=ffff items=0 ppid=2206 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.108000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:36:11.108000 audit: BPF prog-id=87 op=UNLOAD May 17 00:36:11.108000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { perfmon } for pid=2312 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit[2312]: AVC avc: denied { bpf } for pid=2312 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.108000 audit: BPF prog-id=88 op=LOAD May 17 00:36:11.108000 audit[2312]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb3ca9a50 a2=94 a3=7fffb3ca9c30 items=0 ppid=2206 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.108000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:36:11.108000 audit: BPF prog-id=88 op=UNLOAD May 17 00:36:11.207695 systemd-networkd[1013]: vxlan.calico: Link UP May 17 00:36:11.207713 systemd-networkd[1013]: vxlan.calico: Gained carrier May 17 00:36:11.265000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.265000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.265000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.265000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.265000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.265000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.265000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.265000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.265000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.265000 audit: BPF prog-id=89 op=LOAD May 17 00:36:11.265000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd974eccd0 a2=98 a3=0 items=0 ppid=2206 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.265000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:11.265000 audit: BPF prog-id=89 op=UNLOAD May 17 00:36:11.266000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit: BPF prog-id=90 op=LOAD May 17 00:36:11.266000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd974ecae0 a2=94 a3=54428f items=0 ppid=2206 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:11.266000 audit: BPF prog-id=90 op=UNLOAD May 17 00:36:11.266000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit: BPF prog-id=91 op=LOAD May 17 00:36:11.266000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd974ecb10 a2=94 a3=2 items=0 ppid=2206 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:11.266000 audit: BPF prog-id=91 op=UNLOAD May 17 00:36:11.266000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd974ec9e0 a2=28 a3=0 items=0 ppid=2206 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd974eca10 a2=28 a3=0 items=0 ppid=2206 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd974ec920 a2=28 a3=0 items=0 ppid=2206 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd974eca30 a2=28 a3=0 items=0 ppid=2206 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd974eca10 a2=28 a3=0 items=0 ppid=2206 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd974eca00 a2=28 a3=0 items=0 ppid=2206 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd974eca30 a2=28 a3=0 items=0 ppid=2206 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd974eca10 a2=28 a3=0 items=0 ppid=2206 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd974eca30 a2=28 a3=0 items=0 ppid=2206 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd974eca00 a2=28 a3=0 items=0 ppid=2206 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd974eca70 a2=28 a3=0 items=0 ppid=2206 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.266000 audit: BPF prog-id=92 op=LOAD May 17 00:36:11.266000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd974ec8e0 a2=94 a3=0 items=0 ppid=2206 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:11.267000 audit: BPF prog-id=92 op=UNLOAD May 17 00:36:11.268000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.268000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd974ec8d0 a2=50 a3=2800 items=0 ppid=2206 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.268000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:11.271000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.271000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd974ec8d0 a2=50 a3=2800 items=0 ppid=2206 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.271000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:11.271000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.271000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.271000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.271000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.271000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.271000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.271000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.271000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.271000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.271000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.271000 audit: BPF prog-id=93 op=LOAD May 17 00:36:11.271000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd974ec0f0 a2=94 a3=2 items=0 ppid=2206 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.271000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:11.271000 audit: BPF prog-id=93 op=UNLOAD May 17 00:36:11.271000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.271000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.271000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.271000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.271000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.271000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.271000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.271000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.271000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.271000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.271000 audit: BPF prog-id=94 op=LOAD May 17 00:36:11.271000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd974ec1f0 a2=94 a3=30 items=0 ppid=2206 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.271000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit: BPF prog-id=95 op=LOAD May 17 00:36:11.278000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0c446140 a2=98 a3=0 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.278000 audit: BPF prog-id=95 op=UNLOAD May 17 00:36:11.278000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit: BPF prog-id=96 op=LOAD May 17 00:36:11.278000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff0c445f30 a2=94 a3=54428f items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.278000 audit: BPF prog-id=96 op=UNLOAD May 17 00:36:11.278000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.278000 audit: BPF prog-id=97 op=LOAD May 17 00:36:11.278000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff0c445f60 a2=94 a3=2 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.278000 audit: BPF prog-id=97 op=UNLOAD May 17 00:36:11.442000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.442000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.442000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.442000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.442000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.442000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.442000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.442000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.442000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.442000 audit: BPF prog-id=98 op=LOAD May 17 00:36:11.442000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff0c445e20 a2=94 a3=1 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.442000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.442000 audit: BPF prog-id=98 op=UNLOAD May 17 00:36:11.442000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.442000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff0c445ef0 a2=50 a3=7fff0c445fd0 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.442000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.455000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.455000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0c445e30 a2=28 a3=0 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.455000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.455000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0c445e60 a2=28 a3=0 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.455000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.455000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0c445d70 a2=28 a3=0 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.455000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.455000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0c445e80 a2=28 a3=0 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.455000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.455000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0c445e60 a2=28 a3=0 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.455000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.455000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0c445e50 a2=28 a3=0 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.455000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.455000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0c445e80 a2=28 a3=0 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.455000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.455000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0c445e60 a2=28 a3=0 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.455000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.455000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0c445e80 a2=28 a3=0 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.455000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.455000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0c445e50 a2=28 a3=0 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.455000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.455000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0c445ec0 a2=28 a3=0 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff0c445c70 a2=50 a3=1 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit: BPF prog-id=99 op=LOAD May 17 00:36:11.456000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff0c445c70 a2=94 a3=5 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.456000 audit: BPF prog-id=99 op=UNLOAD May 17 00:36:11.456000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff0c445d20 a2=50 a3=1 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff0c445e40 a2=4 a3=38 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { confidentiality } for pid=2342 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:11.456000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff0c445e90 a2=94 a3=6 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.456000 audit[2342]: AVC avc: denied { confidentiality } for pid=2342 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:11.456000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff0c445640 a2=94 a3=88 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.457000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.457000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.457000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.457000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.457000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.457000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.457000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.457000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.457000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff0c445640 a2=94 a3=88 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.457000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.458000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.458000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff0c447070 a2=10 a3=f0f0f8f01000 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.458000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.459000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.459000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff0c446f10 a2=10 a3=3 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.459000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.459000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.459000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff0c446eb0 a2=10 a3=3 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.459000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.459000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:11.459000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff0c446eb0 a2=10 a3=7 items=0 ppid=2206 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.459000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:36:11.471000 audit: BPF prog-id=94 op=UNLOAD May 17 00:36:11.585000 audit[2373]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:11.588000 audit[2366]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:11.588000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffda2bffbc0 a2=0 a3=7ffda2bffbac items=0 ppid=2206 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.588000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:11.590000 audit[2368]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:11.590000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff98c2a680 a2=0 a3=7fff98c2a66c items=0 ppid=2206 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.590000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:11.585000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fffff9698e0 a2=0 a3=7fffff9698cc items=0 ppid=2206 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.585000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:11.604000 audit[2367]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:11.604000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffedda859b0 a2=0 a3=7ffedda8599c items=0 ppid=2206 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:11.604000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:11.652164 kubelet[1534]: E0517 00:36:11.652089 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:11.822980 env[1204]: time="2025-05-17T00:36:11.822659476Z" level=info msg="StopPodSandbox for \"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b\"" May 17 00:36:11.949143 env[1204]: 2025-05-17 00:36:11.897 [INFO][2386] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" May 17 00:36:11.949143 env[1204]: 2025-05-17 00:36:11.897 [INFO][2386] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" iface="eth0" netns="/var/run/netns/cni-43d196b6-a860-1f44-a651-21053b750d2f" May 17 00:36:11.949143 env[1204]: 2025-05-17 00:36:11.897 [INFO][2386] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" iface="eth0" netns="/var/run/netns/cni-43d196b6-a860-1f44-a651-21053b750d2f" May 17 00:36:11.949143 env[1204]: 2025-05-17 00:36:11.898 [INFO][2386] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" iface="eth0" netns="/var/run/netns/cni-43d196b6-a860-1f44-a651-21053b750d2f" May 17 00:36:11.949143 env[1204]: 2025-05-17 00:36:11.898 [INFO][2386] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" May 17 00:36:11.949143 env[1204]: 2025-05-17 00:36:11.898 [INFO][2386] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" May 17 00:36:11.949143 env[1204]: 2025-05-17 00:36:11.929 [INFO][2393] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" HandleID="k8s-pod-network.d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" Workload="10.128.0.12-k8s-csi--node--driver--pt9zn-eth0" May 17 00:36:11.949143 env[1204]: 2025-05-17 00:36:11.930 [INFO][2393] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:11.949143 env[1204]: 2025-05-17 00:36:11.930 [INFO][2393] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:11.949143 env[1204]: 2025-05-17 00:36:11.941 [WARNING][2393] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" HandleID="k8s-pod-network.d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" Workload="10.128.0.12-k8s-csi--node--driver--pt9zn-eth0" May 17 00:36:11.949143 env[1204]: 2025-05-17 00:36:11.941 [INFO][2393] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" HandleID="k8s-pod-network.d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" Workload="10.128.0.12-k8s-csi--node--driver--pt9zn-eth0" May 17 00:36:11.949143 env[1204]: 2025-05-17 00:36:11.943 [INFO][2393] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:11.949143 env[1204]: 2025-05-17 00:36:11.947 [INFO][2386] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" May 17 00:36:11.952846 systemd[1]: run-netns-cni\x2d43d196b6\x2da860\x2d1f44\x2da651\x2d21053b750d2f.mount: Deactivated successfully. May 17 00:36:11.955311 env[1204]: time="2025-05-17T00:36:11.955223156Z" level=info msg="TearDown network for sandbox \"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b\" successfully" May 17 00:36:11.955311 env[1204]: time="2025-05-17T00:36:11.955287740Z" level=info msg="StopPodSandbox for \"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b\" returns successfully" May 17 00:36:11.956381 env[1204]: time="2025-05-17T00:36:11.956335600Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pt9zn,Uid:a1c914fd-f7a4-4351-b87f-b130b6eea600,Namespace:calico-system,Attempt:1,}" May 17 00:36:12.139200 systemd-networkd[1013]: cali0660c6cfd17: Link UP May 17 00:36:12.145573 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0660c6cfd17: link becomes ready May 17 00:36:12.146415 systemd-networkd[1013]: cali0660c6cfd17: Gained carrier May 17 00:36:12.177516 env[1204]: 2025-05-17 00:36:12.032 [INFO][2400] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.12-k8s-csi--node--driver--pt9zn-eth0 csi-node-driver- calico-system a1c914fd-f7a4-4351-b87f-b130b6eea600 1306 0 2025-05-17 00:35:46 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:78f6f74485 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.128.0.12 csi-node-driver-pt9zn eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali0660c6cfd17 [] [] }} ContainerID="006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922" Namespace="calico-system" Pod="csi-node-driver-pt9zn" WorkloadEndpoint="10.128.0.12-k8s-csi--node--driver--pt9zn-" May 17 00:36:12.177516 env[1204]: 2025-05-17 00:36:12.032 [INFO][2400] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922" Namespace="calico-system" Pod="csi-node-driver-pt9zn" WorkloadEndpoint="10.128.0.12-k8s-csi--node--driver--pt9zn-eth0" May 17 00:36:12.177516 env[1204]: 2025-05-17 00:36:12.067 [INFO][2413] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922" HandleID="k8s-pod-network.006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922" Workload="10.128.0.12-k8s-csi--node--driver--pt9zn-eth0" May 17 00:36:12.177516 env[1204]: 2025-05-17 00:36:12.067 [INFO][2413] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922" HandleID="k8s-pod-network.006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922" Workload="10.128.0.12-k8s-csi--node--driver--pt9zn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c9020), Attrs:map[string]string{"namespace":"calico-system", "node":"10.128.0.12", "pod":"csi-node-driver-pt9zn", "timestamp":"2025-05-17 00:36:12.067160362 +0000 UTC"}, Hostname:"10.128.0.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:36:12.177516 env[1204]: 2025-05-17 00:36:12.067 [INFO][2413] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:12.177516 env[1204]: 2025-05-17 00:36:12.067 [INFO][2413] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:12.177516 env[1204]: 2025-05-17 00:36:12.067 [INFO][2413] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.12' May 17 00:36:12.177516 env[1204]: 2025-05-17 00:36:12.078 [INFO][2413] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922" host="10.128.0.12" May 17 00:36:12.177516 env[1204]: 2025-05-17 00:36:12.086 [INFO][2413] ipam/ipam.go 394: Looking up existing affinities for host host="10.128.0.12" May 17 00:36:12.177516 env[1204]: 2025-05-17 00:36:12.096 [INFO][2413] ipam/ipam.go 511: Trying affinity for 192.168.113.192/26 host="10.128.0.12" May 17 00:36:12.177516 env[1204]: 2025-05-17 00:36:12.101 [INFO][2413] ipam/ipam.go 158: Attempting to load block cidr=192.168.113.192/26 host="10.128.0.12" May 17 00:36:12.177516 env[1204]: 2025-05-17 00:36:12.105 [INFO][2413] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.113.192/26 host="10.128.0.12" May 17 00:36:12.177516 env[1204]: 2025-05-17 00:36:12.105 [INFO][2413] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.113.192/26 handle="k8s-pod-network.006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922" host="10.128.0.12" May 17 00:36:12.177516 env[1204]: 2025-05-17 00:36:12.110 [INFO][2413] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922 May 17 00:36:12.177516 env[1204]: 2025-05-17 00:36:12.117 [INFO][2413] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.113.192/26 handle="k8s-pod-network.006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922" host="10.128.0.12" May 17 00:36:12.177516 env[1204]: 2025-05-17 00:36:12.130 [INFO][2413] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.113.193/26] block=192.168.113.192/26 handle="k8s-pod-network.006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922" host="10.128.0.12" May 17 00:36:12.177516 env[1204]: 2025-05-17 00:36:12.131 [INFO][2413] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.113.193/26] handle="k8s-pod-network.006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922" host="10.128.0.12" May 17 00:36:12.177516 env[1204]: 2025-05-17 00:36:12.131 [INFO][2413] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:12.177516 env[1204]: 2025-05-17 00:36:12.131 [INFO][2413] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.193/26] IPv6=[] ContainerID="006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922" HandleID="k8s-pod-network.006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922" Workload="10.128.0.12-k8s-csi--node--driver--pt9zn-eth0" May 17 00:36:12.179039 env[1204]: 2025-05-17 00:36:12.133 [INFO][2400] cni-plugin/k8s.go 418: Populated endpoint ContainerID="006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922" Namespace="calico-system" Pod="csi-node-driver-pt9zn" WorkloadEndpoint="10.128.0.12-k8s-csi--node--driver--pt9zn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.12-k8s-csi--node--driver--pt9zn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a1c914fd-f7a4-4351-b87f-b130b6eea600", ResourceVersion:"1306", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.12", ContainerID:"", Pod:"csi-node-driver-pt9zn", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.113.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0660c6cfd17", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:12.179039 env[1204]: 2025-05-17 00:36:12.133 [INFO][2400] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.113.193/32] ContainerID="006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922" Namespace="calico-system" Pod="csi-node-driver-pt9zn" WorkloadEndpoint="10.128.0.12-k8s-csi--node--driver--pt9zn-eth0" May 17 00:36:12.179039 env[1204]: 2025-05-17 00:36:12.133 [INFO][2400] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0660c6cfd17 ContainerID="006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922" Namespace="calico-system" Pod="csi-node-driver-pt9zn" WorkloadEndpoint="10.128.0.12-k8s-csi--node--driver--pt9zn-eth0" May 17 00:36:12.179039 env[1204]: 2025-05-17 00:36:12.147 [INFO][2400] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922" Namespace="calico-system" Pod="csi-node-driver-pt9zn" WorkloadEndpoint="10.128.0.12-k8s-csi--node--driver--pt9zn-eth0" May 17 00:36:12.179039 env[1204]: 2025-05-17 00:36:12.148 [INFO][2400] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922" Namespace="calico-system" Pod="csi-node-driver-pt9zn" WorkloadEndpoint="10.128.0.12-k8s-csi--node--driver--pt9zn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.12-k8s-csi--node--driver--pt9zn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a1c914fd-f7a4-4351-b87f-b130b6eea600", ResourceVersion:"1306", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.12", ContainerID:"006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922", Pod:"csi-node-driver-pt9zn", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.113.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0660c6cfd17", MAC:"56:ec:90:96:ca:26", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:12.179039 env[1204]: 2025-05-17 00:36:12.168 [INFO][2400] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922" Namespace="calico-system" Pod="csi-node-driver-pt9zn" WorkloadEndpoint="10.128.0.12-k8s-csi--node--driver--pt9zn-eth0" May 17 00:36:12.192403 env[1204]: time="2025-05-17T00:36:12.192301040Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:12.192618 env[1204]: time="2025-05-17T00:36:12.192444543Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:12.192618 env[1204]: time="2025-05-17T00:36:12.192524476Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:12.192889 env[1204]: time="2025-05-17T00:36:12.192834395Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922 pid=2438 runtime=io.containerd.runc.v2 May 17 00:36:12.200000 audit[2428]: NETFILTER_CFG table=filter:69 family=2 entries=38 op=nft_register_chain pid=2428 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:12.200000 audit[2428]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffe86367ac0 a2=0 a3=7ffe86367aac items=0 ppid=2206 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.200000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:12.234240 systemd[1]: Started cri-containerd-006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922.scope. May 17 00:36:12.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.257000 audit: BPF prog-id=100 op=LOAD May 17 00:36:12.257000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.257000 audit[2447]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001cfc48 a2=10 a3=1c items=0 ppid=2438 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030363430303530306536386165346633636232633133393830323933 May 17 00:36:12.257000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.257000 audit[2447]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001cf6b0 a2=3c a3=c items=0 ppid=2438 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030363430303530306536386165346633636232633133393830323933 May 17 00:36:12.257000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.257000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.257000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.257000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.257000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.257000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.257000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.257000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.257000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.257000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.257000 audit: BPF prog-id=101 op=LOAD May 17 00:36:12.257000 audit[2447]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001cf9d8 a2=78 a3=c000383510 items=0 ppid=2438 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030363430303530306536386165346633636232633133393830323933 May 17 00:36:12.258000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.258000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.258000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.258000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.258000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.258000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.258000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.258000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.258000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.258000 audit: BPF prog-id=102 op=LOAD May 17 00:36:12.258000 audit[2447]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001cf770 a2=78 a3=c000383558 items=0 ppid=2438 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030363430303530306536386165346633636232633133393830323933 May 17 00:36:12.258000 audit: BPF prog-id=102 op=UNLOAD May 17 00:36:12.258000 audit: BPF prog-id=101 op=UNLOAD May 17 00:36:12.258000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.258000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.258000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.258000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.258000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.258000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.258000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.258000 audit[2447]: AVC avc: denied { perfmon } for pid=2447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.258000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.258000 audit[2447]: AVC avc: denied { bpf } for pid=2447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.258000 audit: BPF prog-id=103 op=LOAD May 17 00:36:12.258000 audit[2447]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001cfc30 a2=78 a3=c000383968 items=0 ppid=2438 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030363430303530306536386165346633636232633133393830323933 May 17 00:36:12.279108 env[1204]: time="2025-05-17T00:36:12.278558538Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pt9zn,Uid:a1c914fd-f7a4-4351-b87f-b130b6eea600,Namespace:calico-system,Attempt:1,} returns sandbox id \"006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922\"" May 17 00:36:12.281276 env[1204]: time="2025-05-17T00:36:12.281221141Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:36:12.652680 kubelet[1534]: E0517 00:36:12.652618 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:12.738278 systemd-networkd[1013]: vxlan.calico: Gained IPv6LL May 17 00:36:13.394541 env[1204]: time="2025-05-17T00:36:13.394461488Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:13.397134 env[1204]: time="2025-05-17T00:36:13.397075406Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:13.399479 env[1204]: time="2025-05-17T00:36:13.399419974Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:13.401939 env[1204]: time="2025-05-17T00:36:13.401863870Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:13.402692 env[1204]: time="2025-05-17T00:36:13.402632639Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 00:36:13.405672 env[1204]: time="2025-05-17T00:36:13.405603613Z" level=info msg="CreateContainer within sandbox \"006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:36:13.428930 env[1204]: time="2025-05-17T00:36:13.428820644Z" level=info msg="CreateContainer within sandbox \"006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"de38cecab9191399ef891b342e9e902a570de74fc1202ef2f87093a9b24d42db\"" May 17 00:36:13.430110 env[1204]: time="2025-05-17T00:36:13.430047743Z" level=info msg="StartContainer for \"de38cecab9191399ef891b342e9e902a570de74fc1202ef2f87093a9b24d42db\"" May 17 00:36:13.472830 systemd[1]: Started cri-containerd-de38cecab9191399ef891b342e9e902a570de74fc1202ef2f87093a9b24d42db.scope. May 17 00:36:13.494000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.494000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ffaa5b47cc8 items=0 ppid=2438 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:13.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465333863656361623931393133393965663839316233343265396539 May 17 00:36:13.494000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.494000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.494000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.494000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.494000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.494000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.494000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.494000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.494000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.494000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.494000 audit: BPF prog-id=104 op=LOAD May 17 00:36:13.494000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00030aa58 items=0 ppid=2438 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:13.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465333863656361623931393133393965663839316233343265396539 May 17 00:36:13.494000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.494000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.494000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.494000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.494000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.494000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.494000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.494000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.494000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.494000 audit: BPF prog-id=105 op=LOAD May 17 00:36:13.494000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00030aaa8 items=0 ppid=2438 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:13.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465333863656361623931393133393965663839316233343265396539 May 17 00:36:13.495000 audit: BPF prog-id=105 op=UNLOAD May 17 00:36:13.495000 audit: BPF prog-id=104 op=UNLOAD May 17 00:36:13.495000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.495000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.495000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.495000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.495000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.495000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.495000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.495000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.495000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.495000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:13.495000 audit: BPF prog-id=106 op=LOAD May 17 00:36:13.495000 audit[2486]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00030ab38 items=0 ppid=2438 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:13.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465333863656361623931393133393965663839316233343265396539 May 17 00:36:13.520699 env[1204]: time="2025-05-17T00:36:13.520636213Z" level=info msg="StartContainer for \"de38cecab9191399ef891b342e9e902a570de74fc1202ef2f87093a9b24d42db\" returns successfully" May 17 00:36:13.523281 env[1204]: time="2025-05-17T00:36:13.523232009Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:36:13.654517 kubelet[1534]: E0517 00:36:13.654456 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:13.822835 env[1204]: time="2025-05-17T00:36:13.822751050Z" level=info msg="StopPodSandbox for \"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365\"" May 17 00:36:13.891085 systemd-networkd[1013]: cali0660c6cfd17: Gained IPv6LL May 17 00:36:13.934825 env[1204]: 2025-05-17 00:36:13.879 [INFO][2523] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" May 17 00:36:13.934825 env[1204]: 2025-05-17 00:36:13.879 [INFO][2523] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" iface="eth0" netns="/var/run/netns/cni-19cdd1fd-93d8-59e1-2dde-3346396bf691" May 17 00:36:13.934825 env[1204]: 2025-05-17 00:36:13.879 [INFO][2523] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" iface="eth0" netns="/var/run/netns/cni-19cdd1fd-93d8-59e1-2dde-3346396bf691" May 17 00:36:13.934825 env[1204]: 2025-05-17 00:36:13.880 [INFO][2523] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" iface="eth0" netns="/var/run/netns/cni-19cdd1fd-93d8-59e1-2dde-3346396bf691" May 17 00:36:13.934825 env[1204]: 2025-05-17 00:36:13.880 [INFO][2523] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" May 17 00:36:13.934825 env[1204]: 2025-05-17 00:36:13.880 [INFO][2523] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" May 17 00:36:13.934825 env[1204]: 2025-05-17 00:36:13.919 [INFO][2531] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" HandleID="k8s-pod-network.89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" Workload="10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0" May 17 00:36:13.934825 env[1204]: 2025-05-17 00:36:13.919 [INFO][2531] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:13.934825 env[1204]: 2025-05-17 00:36:13.919 [INFO][2531] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:13.934825 env[1204]: 2025-05-17 00:36:13.928 [WARNING][2531] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" HandleID="k8s-pod-network.89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" Workload="10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0" May 17 00:36:13.934825 env[1204]: 2025-05-17 00:36:13.929 [INFO][2531] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" HandleID="k8s-pod-network.89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" Workload="10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0" May 17 00:36:13.934825 env[1204]: 2025-05-17 00:36:13.930 [INFO][2531] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:13.934825 env[1204]: 2025-05-17 00:36:13.932 [INFO][2523] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" May 17 00:36:13.936195 env[1204]: time="2025-05-17T00:36:13.936134278Z" level=info msg="TearDown network for sandbox \"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365\" successfully" May 17 00:36:13.936416 env[1204]: time="2025-05-17T00:36:13.936379922Z" level=info msg="StopPodSandbox for \"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365\" returns successfully" May 17 00:36:13.939473 env[1204]: time="2025-05-17T00:36:13.938663016Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-2mfff,Uid:bea7c7a4-5c41-4d78-a68e-195386023e27,Namespace:default,Attempt:1,}" May 17 00:36:13.941766 systemd[1]: run-netns-cni\x2d19cdd1fd\x2d93d8\x2d59e1\x2d2dde\x2d3346396bf691.mount: Deactivated successfully. May 17 00:36:14.153800 systemd-networkd[1013]: cali40dd888c1d3: Link UP May 17 00:36:14.161945 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:36:14.170959 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali40dd888c1d3: link becomes ready May 17 00:36:14.173230 systemd-networkd[1013]: cali40dd888c1d3: Gained carrier May 17 00:36:14.190413 env[1204]: 2025-05-17 00:36:14.020 [INFO][2537] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0 nginx-deployment-7fcdb87857- default bea7c7a4-5c41-4d78-a68e-195386023e27 1319 0 2025-05-17 00:36:01 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.12 nginx-deployment-7fcdb87857-2mfff eth0 default [] [] [kns.default ksa.default.default] cali40dd888c1d3 [] [] }} ContainerID="d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052" Namespace="default" Pod="nginx-deployment-7fcdb87857-2mfff" WorkloadEndpoint="10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-" May 17 00:36:14.190413 env[1204]: 2025-05-17 00:36:14.021 [INFO][2537] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052" Namespace="default" Pod="nginx-deployment-7fcdb87857-2mfff" WorkloadEndpoint="10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0" May 17 00:36:14.190413 env[1204]: 2025-05-17 00:36:14.057 [INFO][2552] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052" HandleID="k8s-pod-network.d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052" Workload="10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0" May 17 00:36:14.190413 env[1204]: 2025-05-17 00:36:14.058 [INFO][2552] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052" HandleID="k8s-pod-network.d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052" Workload="10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9070), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.12", "pod":"nginx-deployment-7fcdb87857-2mfff", "timestamp":"2025-05-17 00:36:14.057847827 +0000 UTC"}, Hostname:"10.128.0.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:36:14.190413 env[1204]: 2025-05-17 00:36:14.058 [INFO][2552] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:14.190413 env[1204]: 2025-05-17 00:36:14.058 [INFO][2552] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:14.190413 env[1204]: 2025-05-17 00:36:14.058 [INFO][2552] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.12' May 17 00:36:14.190413 env[1204]: 2025-05-17 00:36:14.082 [INFO][2552] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052" host="10.128.0.12" May 17 00:36:14.190413 env[1204]: 2025-05-17 00:36:14.089 [INFO][2552] ipam/ipam.go 394: Looking up existing affinities for host host="10.128.0.12" May 17 00:36:14.190413 env[1204]: 2025-05-17 00:36:14.095 [INFO][2552] ipam/ipam.go 511: Trying affinity for 192.168.113.192/26 host="10.128.0.12" May 17 00:36:14.190413 env[1204]: 2025-05-17 00:36:14.111 [INFO][2552] ipam/ipam.go 158: Attempting to load block cidr=192.168.113.192/26 host="10.128.0.12" May 17 00:36:14.190413 env[1204]: 2025-05-17 00:36:14.115 [INFO][2552] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.113.192/26 host="10.128.0.12" May 17 00:36:14.190413 env[1204]: 2025-05-17 00:36:14.115 [INFO][2552] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.113.192/26 handle="k8s-pod-network.d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052" host="10.128.0.12" May 17 00:36:14.190413 env[1204]: 2025-05-17 00:36:14.118 [INFO][2552] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052 May 17 00:36:14.190413 env[1204]: 2025-05-17 00:36:14.124 [INFO][2552] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.113.192/26 handle="k8s-pod-network.d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052" host="10.128.0.12" May 17 00:36:14.190413 env[1204]: 2025-05-17 00:36:14.139 [INFO][2552] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.113.194/26] block=192.168.113.192/26 handle="k8s-pod-network.d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052" host="10.128.0.12" May 17 00:36:14.190413 env[1204]: 2025-05-17 00:36:14.139 [INFO][2552] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.113.194/26] handle="k8s-pod-network.d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052" host="10.128.0.12" May 17 00:36:14.190413 env[1204]: 2025-05-17 00:36:14.139 [INFO][2552] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:14.190413 env[1204]: 2025-05-17 00:36:14.139 [INFO][2552] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.194/26] IPv6=[] ContainerID="d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052" HandleID="k8s-pod-network.d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052" Workload="10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0" May 17 00:36:14.191899 env[1204]: 2025-05-17 00:36:14.141 [INFO][2537] cni-plugin/k8s.go 418: Populated endpoint ContainerID="d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052" Namespace="default" Pod="nginx-deployment-7fcdb87857-2mfff" WorkloadEndpoint="10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"bea7c7a4-5c41-4d78-a68e-195386023e27", ResourceVersion:"1319", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.12", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-2mfff", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali40dd888c1d3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:14.191899 env[1204]: 2025-05-17 00:36:14.141 [INFO][2537] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.113.194/32] ContainerID="d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052" Namespace="default" Pod="nginx-deployment-7fcdb87857-2mfff" WorkloadEndpoint="10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0" May 17 00:36:14.191899 env[1204]: 2025-05-17 00:36:14.141 [INFO][2537] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali40dd888c1d3 ContainerID="d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052" Namespace="default" Pod="nginx-deployment-7fcdb87857-2mfff" WorkloadEndpoint="10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0" May 17 00:36:14.191899 env[1204]: 2025-05-17 00:36:14.174 [INFO][2537] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052" Namespace="default" Pod="nginx-deployment-7fcdb87857-2mfff" WorkloadEndpoint="10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0" May 17 00:36:14.191899 env[1204]: 2025-05-17 00:36:14.174 [INFO][2537] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052" Namespace="default" Pod="nginx-deployment-7fcdb87857-2mfff" WorkloadEndpoint="10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"bea7c7a4-5c41-4d78-a68e-195386023e27", ResourceVersion:"1319", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.12", ContainerID:"d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052", Pod:"nginx-deployment-7fcdb87857-2mfff", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali40dd888c1d3", MAC:"f2:ea:48:2c:74:01", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:14.191899 env[1204]: 2025-05-17 00:36:14.185 [INFO][2537] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052" Namespace="default" Pod="nginx-deployment-7fcdb87857-2mfff" WorkloadEndpoint="10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0" May 17 00:36:14.217955 kernel: kauditd_printk_skb: 657 callbacks suppressed May 17 00:36:14.218153 kernel: audit: type=1325 audit(1747442174.210:676): table=filter:70 family=2 entries=42 op=nft_register_chain pid=2571 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:14.210000 audit[2571]: NETFILTER_CFG table=filter:70 family=2 entries=42 op=nft_register_chain pid=2571 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:14.219478 env[1204]: time="2025-05-17T00:36:14.219378826Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:14.219761 env[1204]: time="2025-05-17T00:36:14.219708024Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:14.219951 env[1204]: time="2025-05-17T00:36:14.219892602Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:14.220399 env[1204]: time="2025-05-17T00:36:14.220352040Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052 pid=2575 runtime=io.containerd.runc.v2 May 17 00:36:14.267464 kernel: audit: type=1300 audit(1747442174.210:676): arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffd0a4729a0 a2=0 a3=7ffd0a47298c items=0 ppid=2206 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:14.210000 audit[2571]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffd0a4729a0 a2=0 a3=7ffd0a47298c items=0 ppid=2206 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:14.210000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:14.287978 kernel: audit: type=1327 audit(1747442174.210:676): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:14.304302 systemd[1]: Started cri-containerd-d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052.scope. May 17 00:36:14.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.354952 kernel: audit: type=1400 audit(1747442174.333:677): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.375979 kernel: audit: type=1400 audit(1747442174.333:678): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.396946 kernel: audit: type=1400 audit(1747442174.333:679): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.455058 kernel: audit: type=1400 audit(1747442174.333:680): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.455215 kernel: audit: type=1400 audit(1747442174.333:681): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.476950 kernel: audit: type=1400 audit(1747442174.333:682): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.498976 kernel: audit: type=1400 audit(1747442174.333:683): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.396000 audit: BPF prog-id=107 op=LOAD May 17 00:36:14.396000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.396000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2575 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:14.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435396331383835393862616639393666663930613932356233363263 May 17 00:36:14.396000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.396000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2575 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:14.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435396331383835393862616639393666663930613932356233363263 May 17 00:36:14.396000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.396000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.396000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.396000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.396000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.396000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.396000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.396000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.396000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.396000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.396000 audit: BPF prog-id=108 op=LOAD May 17 00:36:14.396000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c4f10 items=0 ppid=2575 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:14.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435396331383835393862616639393666663930613932356233363263 May 17 00:36:14.397000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.397000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.397000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.397000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.397000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.397000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.397000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.397000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.397000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.397000 audit: BPF prog-id=109 op=LOAD May 17 00:36:14.397000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c4f58 items=0 ppid=2575 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:14.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435396331383835393862616639393666663930613932356233363263 May 17 00:36:14.397000 audit: BPF prog-id=109 op=UNLOAD May 17 00:36:14.397000 audit: BPF prog-id=108 op=UNLOAD May 17 00:36:14.397000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.397000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.397000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.397000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.397000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.397000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.397000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.397000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.397000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.397000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:14.397000 audit: BPF prog-id=110 op=LOAD May 17 00:36:14.397000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c5368 items=0 ppid=2575 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:14.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435396331383835393862616639393666663930613932356233363263 May 17 00:36:14.537489 env[1204]: time="2025-05-17T00:36:14.537426337Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-2mfff,Uid:bea7c7a4-5c41-4d78-a68e-195386023e27,Namespace:default,Attempt:1,} returns sandbox id \"d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052\"" May 17 00:36:14.655370 kubelet[1534]: E0517 00:36:14.655289 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:14.966195 env[1204]: time="2025-05-17T00:36:14.966115067Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:14.968527 env[1204]: time="2025-05-17T00:36:14.968466307Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:14.970870 env[1204]: time="2025-05-17T00:36:14.970804017Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:14.973304 env[1204]: time="2025-05-17T00:36:14.973248047Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:14.974172 env[1204]: time="2025-05-17T00:36:14.974115904Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 00:36:14.976734 env[1204]: time="2025-05-17T00:36:14.976693990Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 17 00:36:14.977871 env[1204]: time="2025-05-17T00:36:14.977808146Z" level=info msg="CreateContainer within sandbox \"006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:36:15.000249 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4098363545.mount: Deactivated successfully. May 17 00:36:15.007336 env[1204]: time="2025-05-17T00:36:15.007244414Z" level=info msg="CreateContainer within sandbox \"006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"8b21c970e84c595c2133ec624c77764e8070906bb6d10e02d9266b7e86d26598\"" May 17 00:36:15.008388 env[1204]: time="2025-05-17T00:36:15.008317756Z" level=info msg="StartContainer for \"8b21c970e84c595c2133ec624c77764e8070906bb6d10e02d9266b7e86d26598\"" May 17 00:36:15.053180 systemd[1]: Started cri-containerd-8b21c970e84c595c2133ec624c77764e8070906bb6d10e02d9266b7e86d26598.scope. May 17 00:36:15.076000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.076000 audit[2617]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f4d05809ee8 items=0 ppid=2438 pid=2617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:15.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862323163393730653834633539356332313333656336323463373737 May 17 00:36:15.076000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.076000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.076000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.076000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.076000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.076000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.076000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.076000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.076000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.076000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.076000 audit: BPF prog-id=111 op=LOAD May 17 00:36:15.076000 audit[2617]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003dc2a8 items=0 ppid=2438 pid=2617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:15.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862323163393730653834633539356332313333656336323463373737 May 17 00:36:15.077000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.077000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.077000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.077000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.077000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.077000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.077000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.077000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.077000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.077000 audit: BPF prog-id=112 op=LOAD May 17 00:36:15.077000 audit[2617]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003dc2f8 items=0 ppid=2438 pid=2617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:15.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862323163393730653834633539356332313333656336323463373737 May 17 00:36:15.077000 audit: BPF prog-id=112 op=UNLOAD May 17 00:36:15.077000 audit: BPF prog-id=111 op=UNLOAD May 17 00:36:15.077000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.077000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.077000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.077000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.077000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.077000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.077000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.077000 audit[2617]: AVC avc: denied { perfmon } for pid=2617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.077000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.077000 audit[2617]: AVC avc: denied { bpf } for pid=2617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:15.077000 audit: BPF prog-id=113 op=LOAD May 17 00:36:15.077000 audit[2617]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003dc388 items=0 ppid=2438 pid=2617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:15.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862323163393730653834633539356332313333656336323463373737 May 17 00:36:15.105942 env[1204]: time="2025-05-17T00:36:15.104150327Z" level=info msg="StartContainer for \"8b21c970e84c595c2133ec624c77764e8070906bb6d10e02d9266b7e86d26598\" returns successfully" May 17 00:36:15.655568 kubelet[1534]: E0517 00:36:15.655485 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:15.683804 systemd-networkd[1013]: cali40dd888c1d3: Gained IPv6LL May 17 00:36:15.724062 update_engine[1192]: I0517 00:36:15.723992 1192 update_attempter.cc:509] Updating boot flags... May 17 00:36:15.808416 kubelet[1534]: I0517 00:36:15.807581 1534 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:36:15.808416 kubelet[1534]: I0517 00:36:15.807629 1534 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:36:15.986389 kubelet[1534]: I0517 00:36:15.985962 1534 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-pt9zn" podStartSLOduration=27.290920902 podStartE2EDuration="29.985939588s" podCreationTimestamp="2025-05-17 00:35:46 +0000 UTC" firstStartedPulling="2025-05-17 00:36:12.280494271 +0000 UTC m=+26.670017714" lastFinishedPulling="2025-05-17 00:36:14.975512949 +0000 UTC m=+29.365036400" observedRunningTime="2025-05-17 00:36:15.984746975 +0000 UTC m=+30.374270429" watchObservedRunningTime="2025-05-17 00:36:15.985939588 +0000 UTC m=+30.375463039" May 17 00:36:16.656314 kubelet[1534]: E0517 00:36:16.656232 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:17.657094 kubelet[1534]: E0517 00:36:17.656971 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:17.771437 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount77873679.mount: Deactivated successfully. May 17 00:36:18.658162 kubelet[1534]: E0517 00:36:18.658045 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:19.658520 kubelet[1534]: E0517 00:36:19.658445 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:19.671492 env[1204]: time="2025-05-17T00:36:19.671377550Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:19.674332 env[1204]: time="2025-05-17T00:36:19.674257536Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:19.677543 env[1204]: time="2025-05-17T00:36:19.677473912Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:19.680986 env[1204]: time="2025-05-17T00:36:19.680933384Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:19.682401 env[1204]: time="2025-05-17T00:36:19.682328343Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 17 00:36:19.686469 env[1204]: time="2025-05-17T00:36:19.686424487Z" level=info msg="CreateContainer within sandbox \"d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 17 00:36:19.709677 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4045781195.mount: Deactivated successfully. May 17 00:36:19.716192 env[1204]: time="2025-05-17T00:36:19.716116793Z" level=info msg="CreateContainer within sandbox \"d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"1a4aec79cb869e479144004cbad30306bc7cdc0472735afd365d672b209bc055\"" May 17 00:36:19.717367 env[1204]: time="2025-05-17T00:36:19.717318265Z" level=info msg="StartContainer for \"1a4aec79cb869e479144004cbad30306bc7cdc0472735afd365d672b209bc055\"" May 17 00:36:19.761108 systemd[1]: run-containerd-runc-k8s.io-1a4aec79cb869e479144004cbad30306bc7cdc0472735afd365d672b209bc055-runc.Z94JsD.mount: Deactivated successfully. May 17 00:36:19.769341 systemd[1]: Started cri-containerd-1a4aec79cb869e479144004cbad30306bc7cdc0472735afd365d672b209bc055.scope. May 17 00:36:19.812277 kernel: kauditd_printk_skb: 93 callbacks suppressed May 17 00:36:19.812516 kernel: audit: type=1400 audit(1747442179.785:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.833978 kernel: audit: type=1400 audit(1747442179.785:702): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.875729 kernel: audit: type=1400 audit(1747442179.785:703): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.876037 kernel: audit: type=1400 audit(1747442179.785:704): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.876106 kernel: audit: type=1400 audit(1747442179.785:705): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.917439 kernel: audit: type=1400 audit(1747442179.785:706): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.944572 env[1204]: time="2025-05-17T00:36:19.944500549Z" level=info msg="StartContainer for \"1a4aec79cb869e479144004cbad30306bc7cdc0472735afd365d672b209bc055\" returns successfully" May 17 00:36:19.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.965607 kernel: audit: type=1400 audit(1747442179.785:707): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.965801 kernel: audit: type=1400 audit(1747442179.785:708): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.986933 kernel: audit: type=1400 audit(1747442179.785:709): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.998209 kubelet[1534]: I0517 00:36:19.991806 1534 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-2mfff" podStartSLOduration=13.846268586 podStartE2EDuration="18.991780623s" podCreationTimestamp="2025-05-17 00:36:01 +0000 UTC" firstStartedPulling="2025-05-17 00:36:14.539153352 +0000 UTC m=+28.928676795" lastFinishedPulling="2025-05-17 00:36:19.684665385 +0000 UTC m=+34.074188832" observedRunningTime="2025-05-17 00:36:19.991454646 +0000 UTC m=+34.380978100" watchObservedRunningTime="2025-05-17 00:36:19.991780623 +0000 UTC m=+34.381304079" May 17 00:36:20.007973 kernel: audit: type=1400 audit(1747442179.790:710): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.790000 audit: BPF prog-id=114 op=LOAD May 17 00:36:19.791000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.791000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2575 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:19.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161346165633739636238363965343739313434303034636261643330 May 17 00:36:19.791000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.791000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2575 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:19.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161346165633739636238363965343739313434303034636261643330 May 17 00:36:19.791000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.791000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.791000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.791000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.791000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.791000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.791000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.791000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.791000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.791000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.791000 audit: BPF prog-id=115 op=LOAD May 17 00:36:19.791000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00020ac80 items=0 ppid=2575 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:19.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161346165633739636238363965343739313434303034636261643330 May 17 00:36:19.811000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.811000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.811000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.811000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.811000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.811000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.811000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.811000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.811000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.811000 audit: BPF prog-id=116 op=LOAD May 17 00:36:19.811000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00020acc8 items=0 ppid=2575 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:19.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161346165633739636238363965343739313434303034636261643330 May 17 00:36:19.811000 audit: BPF prog-id=116 op=UNLOAD May 17 00:36:19.811000 audit: BPF prog-id=115 op=UNLOAD May 17 00:36:19.811000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.811000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.811000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.811000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.811000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.811000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.811000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.811000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.811000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.811000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:19.811000 audit: BPF prog-id=117 op=LOAD May 17 00:36:19.811000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00020b0d8 items=0 ppid=2575 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:19.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161346165633739636238363965343739313434303034636261643330 May 17 00:36:20.659715 kubelet[1534]: E0517 00:36:20.659629 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:21.659926 kubelet[1534]: E0517 00:36:21.659845 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:22.660349 kubelet[1534]: E0517 00:36:22.660269 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:23.661523 kubelet[1534]: E0517 00:36:23.661433 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:24.662513 kubelet[1534]: E0517 00:36:24.662426 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:25.662874 kubelet[1534]: E0517 00:36:25.662797 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:26.600316 kubelet[1534]: E0517 00:36:26.600234 1534 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:26.663671 kubelet[1534]: E0517 00:36:26.663587 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:27.448000 audit[2734]: NETFILTER_CFG table=filter:71 family=2 entries=24 op=nft_register_rule pid=2734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:27.455659 kernel: kauditd_printk_skb: 47 callbacks suppressed May 17 00:36:27.455814 kernel: audit: type=1325 audit(1747442187.448:719): table=filter:71 family=2 entries=24 op=nft_register_rule pid=2734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:27.473095 kernel: audit: type=1300 audit(1747442187.448:719): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffc04eb5c30 a2=0 a3=7ffc04eb5c1c items=0 ppid=1690 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:27.448000 audit[2734]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffc04eb5c30 a2=0 a3=7ffc04eb5c1c items=0 ppid=1690 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:27.448000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:27.520772 kernel: audit: type=1327 audit(1747442187.448:719): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:27.521000 audit[2734]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=2734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:27.525843 systemd[1]: Created slice kubepods-besteffort-pod9999a3c5_9b64_4eb7_8379_501db11810a9.slice. May 17 00:36:27.540007 kernel: audit: type=1325 audit(1747442187.521:720): table=nat:72 family=2 entries=22 op=nft_register_rule pid=2734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:27.540238 kernel: audit: type=1300 audit(1747442187.521:720): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc04eb5c30 a2=0 a3=0 items=0 ppid=1690 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:27.521000 audit[2734]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc04eb5c30 a2=0 a3=0 items=0 ppid=1690 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:27.521000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:27.563000 audit[2736]: NETFILTER_CFG table=filter:73 family=2 entries=36 op=nft_register_rule pid=2736 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:27.602780 kernel: audit: type=1327 audit(1747442187.521:720): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:27.602967 kernel: audit: type=1325 audit(1747442187.563:721): table=filter:73 family=2 entries=36 op=nft_register_rule pid=2736 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:27.563000 audit[2736]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffee3929e60 a2=0 a3=7ffee3929e4c items=0 ppid=1690 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:27.637951 kernel: audit: type=1300 audit(1747442187.563:721): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffee3929e60 a2=0 a3=7ffee3929e4c items=0 ppid=1690 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:27.638148 kernel: audit: type=1327 audit(1747442187.563:721): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:27.563000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:27.654460 kernel: audit: type=1325 audit(1747442187.603:722): table=nat:74 family=2 entries=22 op=nft_register_rule pid=2736 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:27.603000 audit[2736]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2736 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:27.659108 kubelet[1534]: I0517 00:36:27.659018 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6bcp2\" (UniqueName: \"kubernetes.io/projected/9999a3c5-9b64-4eb7-8379-501db11810a9-kube-api-access-6bcp2\") pod \"nfs-server-provisioner-0\" (UID: \"9999a3c5-9b64-4eb7-8379-501db11810a9\") " pod="default/nfs-server-provisioner-0" May 17 00:36:27.659531 kubelet[1534]: I0517 00:36:27.659482 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/9999a3c5-9b64-4eb7-8379-501db11810a9-data\") pod \"nfs-server-provisioner-0\" (UID: \"9999a3c5-9b64-4eb7-8379-501db11810a9\") " pod="default/nfs-server-provisioner-0" May 17 00:36:27.663966 kubelet[1534]: E0517 00:36:27.663895 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:27.603000 audit[2736]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffee3929e60 a2=0 a3=0 items=0 ppid=1690 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:27.603000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:27.833997 env[1204]: time="2025-05-17T00:36:27.833807828Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:9999a3c5-9b64-4eb7-8379-501db11810a9,Namespace:default,Attempt:0,}" May 17 00:36:28.531776 systemd-networkd[1013]: cali60e51b789ff: Link UP May 17 00:36:28.538968 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:36:28.539111 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 17 00:36:28.547532 systemd-networkd[1013]: cali60e51b789ff: Gained carrier May 17 00:36:28.566417 env[1204]: 2025-05-17 00:36:28.376 [INFO][2739] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.12-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 9999a3c5-9b64-4eb7-8379-501db11810a9 1392 0 2025-05-17 00:36:27 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.128.0.12 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.12-k8s-nfs--server--provisioner--0-" May 17 00:36:28.566417 env[1204]: 2025-05-17 00:36:28.376 [INFO][2739] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.12-k8s-nfs--server--provisioner--0-eth0" May 17 00:36:28.566417 env[1204]: 2025-05-17 00:36:28.413 [INFO][2750] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062" HandleID="k8s-pod-network.6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062" Workload="10.128.0.12-k8s-nfs--server--provisioner--0-eth0" May 17 00:36:28.566417 env[1204]: 2025-05-17 00:36:28.414 [INFO][2750] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062" HandleID="k8s-pod-network.6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062" Workload="10.128.0.12-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000235310), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.12", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-17 00:36:28.413749101 +0000 UTC"}, Hostname:"10.128.0.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:36:28.566417 env[1204]: 2025-05-17 00:36:28.414 [INFO][2750] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:28.566417 env[1204]: 2025-05-17 00:36:28.414 [INFO][2750] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:28.566417 env[1204]: 2025-05-17 00:36:28.414 [INFO][2750] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.12' May 17 00:36:28.566417 env[1204]: 2025-05-17 00:36:28.435 [INFO][2750] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062" host="10.128.0.12" May 17 00:36:28.566417 env[1204]: 2025-05-17 00:36:28.450 [INFO][2750] ipam/ipam.go 394: Looking up existing affinities for host host="10.128.0.12" May 17 00:36:28.566417 env[1204]: 2025-05-17 00:36:28.493 [INFO][2750] ipam/ipam.go 511: Trying affinity for 192.168.113.192/26 host="10.128.0.12" May 17 00:36:28.566417 env[1204]: 2025-05-17 00:36:28.497 [INFO][2750] ipam/ipam.go 158: Attempting to load block cidr=192.168.113.192/26 host="10.128.0.12" May 17 00:36:28.566417 env[1204]: 2025-05-17 00:36:28.505 [INFO][2750] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.113.192/26 host="10.128.0.12" May 17 00:36:28.566417 env[1204]: 2025-05-17 00:36:28.505 [INFO][2750] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.113.192/26 handle="k8s-pod-network.6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062" host="10.128.0.12" May 17 00:36:28.566417 env[1204]: 2025-05-17 00:36:28.510 [INFO][2750] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062 May 17 00:36:28.566417 env[1204]: 2025-05-17 00:36:28.518 [INFO][2750] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.113.192/26 handle="k8s-pod-network.6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062" host="10.128.0.12" May 17 00:36:28.566417 env[1204]: 2025-05-17 00:36:28.525 [INFO][2750] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.113.195/26] block=192.168.113.192/26 handle="k8s-pod-network.6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062" host="10.128.0.12" May 17 00:36:28.566417 env[1204]: 2025-05-17 00:36:28.525 [INFO][2750] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.113.195/26] handle="k8s-pod-network.6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062" host="10.128.0.12" May 17 00:36:28.566417 env[1204]: 2025-05-17 00:36:28.525 [INFO][2750] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:28.566417 env[1204]: 2025-05-17 00:36:28.525 [INFO][2750] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.195/26] IPv6=[] ContainerID="6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062" HandleID="k8s-pod-network.6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062" Workload="10.128.0.12-k8s-nfs--server--provisioner--0-eth0" May 17 00:36:28.568309 env[1204]: 2025-05-17 00:36:28.527 [INFO][2739] cni-plugin/k8s.go 418: Populated endpoint ContainerID="6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.12-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.12-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"9999a3c5-9b64-4eb7-8379-501db11810a9", ResourceVersion:"1392", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.12", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.113.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:28.568309 env[1204]: 2025-05-17 00:36:28.527 [INFO][2739] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.113.195/32] ContainerID="6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.12-k8s-nfs--server--provisioner--0-eth0" May 17 00:36:28.568309 env[1204]: 2025-05-17 00:36:28.527 [INFO][2739] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.12-k8s-nfs--server--provisioner--0-eth0" May 17 00:36:28.568309 env[1204]: 2025-05-17 00:36:28.549 [INFO][2739] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.12-k8s-nfs--server--provisioner--0-eth0" May 17 00:36:28.568809 env[1204]: 2025-05-17 00:36:28.549 [INFO][2739] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.12-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.12-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"9999a3c5-9b64-4eb7-8379-501db11810a9", ResourceVersion:"1392", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.12", ContainerID:"6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.113.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"ba:5b:2a:c3:be:b3", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:28.568809 env[1204]: 2025-05-17 00:36:28.562 [INFO][2739] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.12-k8s-nfs--server--provisioner--0-eth0" May 17 00:36:28.591214 env[1204]: time="2025-05-17T00:36:28.591111247Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:28.591519 env[1204]: time="2025-05-17T00:36:28.591470438Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:28.591704 env[1204]: time="2025-05-17T00:36:28.591662574Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:28.592290 env[1204]: time="2025-05-17T00:36:28.592228200Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062 pid=2774 runtime=io.containerd.runc.v2 May 17 00:36:28.622000 audit[2787]: NETFILTER_CFG table=filter:75 family=2 entries=40 op=nft_register_chain pid=2787 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:28.622000 audit[2787]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffd6ddaabe0 a2=0 a3=7ffd6ddaabcc items=0 ppid=2206 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:28.622000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:28.651969 systemd[1]: run-containerd-runc-k8s.io-6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062-runc.pHDaDE.mount: Deactivated successfully. May 17 00:36:28.657099 systemd[1]: Started cri-containerd-6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062.scope. May 17 00:36:28.665264 kubelet[1534]: E0517 00:36:28.665160 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:28.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.673000 audit: BPF prog-id=118 op=LOAD May 17 00:36:28.675000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2774 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:28.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663313363636263376464626561643663353637336262353936373237 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2774 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:28.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663313363636263376464626561643663353637336262353936373237 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit: BPF prog-id=119 op=LOAD May 17 00:36:28.675000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000288b90 items=0 ppid=2774 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:28.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663313363636263376464626561643663353637336262353936373237 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit: BPF prog-id=120 op=LOAD May 17 00:36:28.675000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000288bd8 items=0 ppid=2774 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:28.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663313363636263376464626561643663353637336262353936373237 May 17 00:36:28.675000 audit: BPF prog-id=120 op=UNLOAD May 17 00:36:28.675000 audit: BPF prog-id=119 op=UNLOAD May 17 00:36:28.675000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { perfmon } for pid=2785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit[2785]: AVC avc: denied { bpf } for pid=2785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:28.675000 audit: BPF prog-id=121 op=LOAD May 17 00:36:28.675000 audit[2785]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000288fe8 items=0 ppid=2774 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:28.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663313363636263376464626561643663353637336262353936373237 May 17 00:36:28.717361 env[1204]: time="2025-05-17T00:36:28.717293256Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:9999a3c5-9b64-4eb7-8379-501db11810a9,Namespace:default,Attempt:0,} returns sandbox id \"6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062\"" May 17 00:36:28.720447 env[1204]: time="2025-05-17T00:36:28.720399228Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 17 00:36:29.665719 kubelet[1534]: E0517 00:36:29.665629 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:29.826155 systemd-networkd[1013]: cali60e51b789ff: Gained IPv6LL May 17 00:36:30.665978 kubelet[1534]: E0517 00:36:30.665854 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:31.496393 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2093324273.mount: Deactivated successfully. May 17 00:36:31.666966 kubelet[1534]: E0517 00:36:31.666869 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:32.667569 kubelet[1534]: E0517 00:36:32.667512 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:33.668306 kubelet[1534]: E0517 00:36:33.668204 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:34.125637 env[1204]: time="2025-05-17T00:36:34.125163757Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:34.128503 env[1204]: time="2025-05-17T00:36:34.128447248Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:34.131032 env[1204]: time="2025-05-17T00:36:34.130981102Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:34.133526 env[1204]: time="2025-05-17T00:36:34.133475389Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:34.134584 env[1204]: time="2025-05-17T00:36:34.134530357Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 17 00:36:34.141594 env[1204]: time="2025-05-17T00:36:34.141524243Z" level=info msg="CreateContainer within sandbox \"6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 17 00:36:34.169308 env[1204]: time="2025-05-17T00:36:34.169219387Z" level=info msg="CreateContainer within sandbox \"6c13ccbc7ddbead6c5673bb59672707a93a4bcba6caef9eb6620e562cc266062\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"da773be9f5a582a127fb4e998572a92258d1899366ef97c15e64441b887271b1\"" May 17 00:36:34.170644 env[1204]: time="2025-05-17T00:36:34.170590314Z" level=info msg="StartContainer for \"da773be9f5a582a127fb4e998572a92258d1899366ef97c15e64441b887271b1\"" May 17 00:36:34.214810 systemd[1]: run-containerd-runc-k8s.io-da773be9f5a582a127fb4e998572a92258d1899366ef97c15e64441b887271b1-runc.3pVmG7.mount: Deactivated successfully. May 17 00:36:34.225167 systemd[1]: Started cri-containerd-da773be9f5a582a127fb4e998572a92258d1899366ef97c15e64441b887271b1.scope. May 17 00:36:34.250282 kernel: kauditd_printk_skb: 62 callbacks suppressed May 17 00:36:34.250500 kernel: audit: type=1400 audit(1747442194.243:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.291997 kernel: audit: type=1400 audit(1747442194.243:743): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.315034 kernel: audit: type=1400 audit(1747442194.243:744): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.341022 kernel: audit: type=1400 audit(1747442194.243:745): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.364095 kernel: audit: type=1400 audit(1747442194.243:746): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.385733 env[1204]: time="2025-05-17T00:36:34.385677614Z" level=info msg="StartContainer for \"da773be9f5a582a127fb4e998572a92258d1899366ef97c15e64441b887271b1\" returns successfully" May 17 00:36:34.385945 kernel: audit: type=1400 audit(1747442194.243:747): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.429544 kernel: audit: type=1400 audit(1747442194.243:748): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.429729 kernel: audit: type=1400 audit(1747442194.243:749): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.429793 kernel: audit: type=1400 audit(1747442194.243:750): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.470737 kernel: audit: type=1400 audit(1747442194.269:751): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.269000 audit: BPF prog-id=122 op=LOAD May 17 00:36:34.270000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.270000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2774 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:34.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461373733626539663561353832613132376662346539393835373261 May 17 00:36:34.270000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.270000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2774 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:34.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461373733626539663561353832613132376662346539393835373261 May 17 00:36:34.270000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.270000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.270000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.270000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.270000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.270000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.270000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.270000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.270000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.270000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.270000 audit: BPF prog-id=123 op=LOAD May 17 00:36:34.270000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003bae60 items=0 ppid=2774 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:34.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461373733626539663561353832613132376662346539393835373261 May 17 00:36:34.290000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.290000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.290000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.290000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.290000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.290000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.290000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.290000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.290000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.290000 audit: BPF prog-id=124 op=LOAD May 17 00:36:34.290000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003baea8 items=0 ppid=2774 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:34.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461373733626539663561353832613132376662346539393835373261 May 17 00:36:34.290000 audit: BPF prog-id=124 op=UNLOAD May 17 00:36:34.290000 audit: BPF prog-id=123 op=UNLOAD May 17 00:36:34.291000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.291000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.291000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.291000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.291000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.291000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.291000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.291000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.291000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.291000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:34.291000 audit: BPF prog-id=125 op=LOAD May 17 00:36:34.291000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003bb2b8 items=0 ppid=2774 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:34.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461373733626539663561353832613132376662346539393835373261 May 17 00:36:34.458000 audit[2856]: AVC avc: denied { search } for pid=2856 comm="rpcbind" name="crypto" dev="proc" ino=22778 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c502 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:36:34.458000 audit[2856]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fabe3e8e0c0 a2=0 a3=0 items=0 ppid=2837 pid=2856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c502 key=(null) May 17 00:36:34.458000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 17 00:36:34.513000 audit[2861]: AVC avc: denied { search } for pid=2861 comm="dbus-daemon" name="crypto" dev="proc" ino=22778 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c502 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:36:34.513000 audit[2861]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f09b6fa10c0 a2=0 a3=0 items=0 ppid=2837 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c502 key=(null) May 17 00:36:34.513000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 17 00:36:34.518000 audit[2862]: AVC avc: denied { watch } for pid=2862 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537481 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c502 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c262,c502 tclass=dir permissive=0 May 17 00:36:34.518000 audit[2862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55d6308e9b50 a2=2c8 a3=7fffe18f3bac items=0 ppid=2837 pid=2862 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c502 key=(null) May 17 00:36:34.518000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 17 00:36:34.529000 audit[2863]: AVC avc: denied { read } for pid=2863 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c502 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 17 00:36:34.529000 audit[2863]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fb6fcc07320 a1=80000 a2=d a3=7ffee41f4980 items=0 ppid=2837 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c502 key=(null) May 17 00:36:34.529000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 17 00:36:34.531000 audit[2863]: AVC avc: denied { search } for pid=2863 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22778 scontext=system_u:system_r:svirt_lxc_net_t:s0:c262,c502 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:36:34.531000 audit[2863]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fb6fc15b0c0 a2=0 a3=0 items=0 ppid=2837 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c262,c502 key=(null) May 17 00:36:34.531000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 17 00:36:34.669302 kubelet[1534]: E0517 00:36:34.669224 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:35.072342 kubelet[1534]: I0517 00:36:35.071950 1534 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.653861339 podStartE2EDuration="8.071924678s" podCreationTimestamp="2025-05-17 00:36:27 +0000 UTC" firstStartedPulling="2025-05-17 00:36:28.71972834 +0000 UTC m=+43.109251784" lastFinishedPulling="2025-05-17 00:36:34.137791681 +0000 UTC m=+48.527315123" observedRunningTime="2025-05-17 00:36:35.071140409 +0000 UTC m=+49.460663863" watchObservedRunningTime="2025-05-17 00:36:35.071924678 +0000 UTC m=+49.461448131" May 17 00:36:35.095000 audit[2884]: NETFILTER_CFG table=filter:76 family=2 entries=24 op=nft_register_rule pid=2884 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:35.095000 audit[2884]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffcebb48f50 a2=0 a3=7ffcebb48f3c items=0 ppid=1690 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:35.095000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:35.102000 audit[2884]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=2884 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:35.102000 audit[2884]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffcebb48f50 a2=0 a3=7ffcebb48f3c items=0 ppid=1690 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:35.102000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:35.670402 kubelet[1534]: E0517 00:36:35.670328 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:36.670566 kubelet[1534]: E0517 00:36:36.670494 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:37.671171 kubelet[1534]: E0517 00:36:37.671100 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:38.672332 kubelet[1534]: E0517 00:36:38.672257 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:39.673067 kubelet[1534]: E0517 00:36:39.672999 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:39.929057 systemd[1]: run-containerd-runc-k8s.io-71580463fcc37bb69178851be173ee142b92468f8a53434f9e6f0ffb6b6eaa0b-runc.Z6olu2.mount: Deactivated successfully. May 17 00:36:40.673384 kubelet[1534]: E0517 00:36:40.673309 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:41.673578 kubelet[1534]: E0517 00:36:41.673499 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:42.674079 kubelet[1534]: E0517 00:36:42.674001 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:43.674423 kubelet[1534]: E0517 00:36:43.674368 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:43.740857 systemd[1]: Created slice kubepods-besteffort-pod999d7f75_a174_4001_a8b5_cfbd5fc3eab0.slice. May 17 00:36:43.774938 kubelet[1534]: I0517 00:36:43.774852 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b75rj\" (UniqueName: \"kubernetes.io/projected/999d7f75-a174-4001-a8b5-cfbd5fc3eab0-kube-api-access-b75rj\") pod \"test-pod-1\" (UID: \"999d7f75-a174-4001-a8b5-cfbd5fc3eab0\") " pod="default/test-pod-1" May 17 00:36:43.775210 kubelet[1534]: I0517 00:36:43.774951 1534 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-54be3c00-9bfe-4c72-990e-16449410a862\" (UniqueName: \"kubernetes.io/nfs/999d7f75-a174-4001-a8b5-cfbd5fc3eab0-pvc-54be3c00-9bfe-4c72-990e-16449410a862\") pod \"test-pod-1\" (UID: \"999d7f75-a174-4001-a8b5-cfbd5fc3eab0\") " pod="default/test-pod-1" May 17 00:36:43.915765 kernel: Failed to create system directory netfs May 17 00:36:43.916009 kernel: kauditd_printk_skb: 68 callbacks suppressed May 17 00:36:43.916070 kernel: audit: type=1400 audit(1747442203.902:767): avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:43.916124 kernel: Failed to create system directory netfs May 17 00:36:43.902000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:43.944028 kernel: audit: type=1400 audit(1747442203.902:767): avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:43.944257 kernel: Failed to create system directory netfs May 17 00:36:43.902000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:43.972051 kernel: audit: type=1400 audit(1747442203.902:767): avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:43.972219 kernel: Failed to create system directory netfs May 17 00:36:43.902000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.023240 kernel: audit: type=1400 audit(1747442203.902:767): avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:43.902000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:43.902000 audit[2912]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56077b1605e0 a1=153bc a2=56076c7d92b0 a3=5 items=0 ppid=56 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:44.057939 kernel: audit: type=1300 audit(1747442203.902:767): arch=c000003e syscall=175 success=yes exit=0 a0=56077b1605e0 a1=153bc a2=56076c7d92b0 a3=5 items=0 ppid=56 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:44.058028 kernel: Failed to create system directory fscache May 17 00:36:44.073831 kernel: audit: type=1327 audit(1747442203.902:767): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:36:44.074036 kernel: Failed to create system directory fscache May 17 00:36:43.902000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:36:44.102636 kernel: audit: type=1400 audit(1747442204.036:768): avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.102970 kernel: Failed to create system directory fscache May 17 00:36:44.036000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.131074 kernel: audit: type=1400 audit(1747442204.036:768): avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.131343 kernel: Failed to create system directory fscache May 17 00:36:44.036000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.159087 kernel: audit: type=1400 audit(1747442204.036:768): avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.159392 kernel: Failed to create system directory fscache May 17 00:36:44.036000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.187137 kernel: audit: type=1400 audit(1747442204.036:768): avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.187341 kernel: Failed to create system directory fscache May 17 00:36:44.036000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.036000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.036000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.036000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.197661 kernel: Failed to create system directory fscache May 17 00:36:44.197794 kernel: Failed to create system directory fscache May 17 00:36:44.036000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.036000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.208177 kernel: Failed to create system directory fscache May 17 00:36:44.208305 kernel: Failed to create system directory fscache May 17 00:36:44.036000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.036000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.218657 kernel: Failed to create system directory fscache May 17 00:36:44.218776 kernel: Failed to create system directory fscache May 17 00:36:44.036000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.036000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.036000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.234680 kernel: Failed to create system directory fscache May 17 00:36:44.234973 kernel: Failed to create system directory fscache May 17 00:36:44.036000 audit[2912]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56077b3759c0 a1=4c0fc a2=56076c7d92b0 a3=5 items=0 ppid=56 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:44.036000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:36:44.240014 kernel: FS-Cache: Loaded May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.295769 kernel: Failed to create system directory sunrpc May 17 00:36:44.295967 kernel: Failed to create system directory sunrpc May 17 00:36:44.296019 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.311570 kernel: Failed to create system directory sunrpc May 17 00:36:44.311700 kernel: Failed to create system directory sunrpc May 17 00:36:44.311779 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.321917 kernel: Failed to create system directory sunrpc May 17 00:36:44.322066 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.332176 kernel: Failed to create system directory sunrpc May 17 00:36:44.332302 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.342490 kernel: Failed to create system directory sunrpc May 17 00:36:44.342597 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.352757 kernel: Failed to create system directory sunrpc May 17 00:36:44.352883 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.368266 kernel: Failed to create system directory sunrpc May 17 00:36:44.368400 kernel: Failed to create system directory sunrpc May 17 00:36:44.368456 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.378540 kernel: Failed to create system directory sunrpc May 17 00:36:44.378658 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.388805 kernel: Failed to create system directory sunrpc May 17 00:36:44.388957 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.399080 kernel: Failed to create system directory sunrpc May 17 00:36:44.399165 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.409359 kernel: Failed to create system directory sunrpc May 17 00:36:44.409515 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.419751 kernel: Failed to create system directory sunrpc May 17 00:36:44.419889 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.429927 kernel: Failed to create system directory sunrpc May 17 00:36:44.430075 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.440406 kernel: Failed to create system directory sunrpc May 17 00:36:44.440579 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.450713 kernel: Failed to create system directory sunrpc May 17 00:36:44.450887 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.461024 kernel: Failed to create system directory sunrpc May 17 00:36:44.461138 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.471366 kernel: Failed to create system directory sunrpc May 17 00:36:44.471459 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.481661 kernel: Failed to create system directory sunrpc May 17 00:36:44.481801 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.491994 kernel: Failed to create system directory sunrpc May 17 00:36:44.492100 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.502325 kernel: Failed to create system directory sunrpc May 17 00:36:44.502482 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.512614 kernel: Failed to create system directory sunrpc May 17 00:36:44.512757 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.522956 kernel: Failed to create system directory sunrpc May 17 00:36:44.523064 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.528953 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.538610 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.543971 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.545009 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.549952 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.559708 kernel: Failed to create system directory sunrpc May 17 00:36:44.559782 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.565044 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.575258 kernel: Failed to create system directory sunrpc May 17 00:36:44.575366 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.585652 kernel: Failed to create system directory sunrpc May 17 00:36:44.585794 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.595818 kernel: Failed to create system directory sunrpc May 17 00:36:44.595985 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.606180 kernel: Failed to create system directory sunrpc May 17 00:36:44.606328 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.616391 kernel: Failed to create system directory sunrpc May 17 00:36:44.616575 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.621579 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.631946 kernel: Failed to create system directory sunrpc May 17 00:36:44.632101 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.642291 kernel: Failed to create system directory sunrpc May 17 00:36:44.642485 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.652631 kernel: Failed to create system directory sunrpc May 17 00:36:44.652807 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.662930 kernel: Failed to create system directory sunrpc May 17 00:36:44.663068 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.673310 kernel: Failed to create system directory sunrpc May 17 00:36:44.673478 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.675569 kubelet[1534]: E0517 00:36:44.675457 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.683622 kernel: Failed to create system directory sunrpc May 17 00:36:44.683799 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.693858 kernel: Failed to create system directory sunrpc May 17 00:36:44.694016 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.704322 kernel: Failed to create system directory sunrpc May 17 00:36:44.704460 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.714649 kernel: Failed to create system directory sunrpc May 17 00:36:44.714817 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.724948 kernel: Failed to create system directory sunrpc May 17 00:36:44.725144 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.735327 kernel: Failed to create system directory sunrpc May 17 00:36:44.735475 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.745588 kernel: Failed to create system directory sunrpc May 17 00:36:44.745771 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.750722 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.755857 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.761011 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.766112 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.771322 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.776398 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.781621 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.786781 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.791951 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.797040 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.802195 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.807490 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.812605 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.817876 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.825621 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.833291 kernel: Failed to create system directory sunrpc May 17 00:36:44.833429 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.843613 kernel: Failed to create system directory sunrpc May 17 00:36:44.843739 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.848652 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.853889 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.859048 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.869332 kernel: Failed to create system directory sunrpc May 17 00:36:44.869456 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.879574 kernel: Failed to create system directory sunrpc May 17 00:36:44.879704 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.889862 kernel: Failed to create system directory sunrpc May 17 00:36:44.890005 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.900129 kernel: Failed to create system directory sunrpc May 17 00:36:44.900316 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.910404 kernel: Failed to create system directory sunrpc May 17 00:36:44.910565 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.920663 kernel: Failed to create system directory sunrpc May 17 00:36:44.920796 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.931213 kernel: Failed to create system directory sunrpc May 17 00:36:44.931364 kernel: Failed to create system directory sunrpc May 17 00:36:44.268000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:44.957436 kernel: RPC: Registered named UNIX socket transport module. May 17 00:36:44.957665 kernel: RPC: Registered udp transport module. May 17 00:36:44.957714 kernel: RPC: Registered tcp transport module. May 17 00:36:44.962133 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 17 00:36:44.268000 audit[2912]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56077b3c1ad0 a1=1a814c a2=56076c7d92b0 a3=5 items=6 ppid=56 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:44.268000 audit: CWD cwd="/" May 17 00:36:44.268000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:44.268000 audit: PATH item=1 name=(null) inode=23607 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:44.268000 audit: PATH item=2 name=(null) inode=23607 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:44.268000 audit: PATH item=3 name=(null) inode=23608 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:44.268000 audit: PATH item=4 name=(null) inode=23607 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:44.268000 audit: PATH item=5 name=(null) inode=23609 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:44.268000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.032967 kernel: Failed to create system directory nfs May 17 00:36:45.033120 kernel: Failed to create system directory nfs May 17 00:36:45.033168 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.042717 kernel: Failed to create system directory nfs May 17 00:36:45.042898 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.052488 kernel: Failed to create system directory nfs May 17 00:36:45.052628 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.062272 kernel: Failed to create system directory nfs May 17 00:36:45.062437 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.072052 kernel: Failed to create system directory nfs May 17 00:36:45.072193 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.081950 kernel: Failed to create system directory nfs May 17 00:36:45.082062 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.091608 kernel: Failed to create system directory nfs May 17 00:36:45.091792 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.101548 kernel: Failed to create system directory nfs May 17 00:36:45.101713 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.111285 kernel: Failed to create system directory nfs May 17 00:36:45.111487 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.121043 kernel: Failed to create system directory nfs May 17 00:36:45.121296 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.130824 kernel: Failed to create system directory nfs May 17 00:36:45.131028 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.140551 kernel: Failed to create system directory nfs May 17 00:36:45.140707 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.150397 kernel: Failed to create system directory nfs May 17 00:36:45.150566 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.160182 kernel: Failed to create system directory nfs May 17 00:36:45.160355 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.165076 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.174845 kernel: Failed to create system directory nfs May 17 00:36:45.175076 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.184623 kernel: Failed to create system directory nfs May 17 00:36:45.184784 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.189698 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.199439 kernel: Failed to create system directory nfs May 17 00:36:45.199571 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.209258 kernel: Failed to create system directory nfs May 17 00:36:45.209355 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.219110 kernel: Failed to create system directory nfs May 17 00:36:45.219250 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.228836 kernel: Failed to create system directory nfs May 17 00:36:45.229014 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.238630 kernel: Failed to create system directory nfs May 17 00:36:45.238793 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.248398 kernel: Failed to create system directory nfs May 17 00:36:45.248575 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.258154 kernel: Failed to create system directory nfs May 17 00:36:45.258316 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.272990 kernel: Failed to create system directory nfs May 17 00:36:45.273158 kernel: Failed to create system directory nfs May 17 00:36:45.273206 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.282744 kernel: Failed to create system directory nfs May 17 00:36:45.282963 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.292552 kernel: Failed to create system directory nfs May 17 00:36:45.292706 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.302308 kernel: Failed to create system directory nfs May 17 00:36:45.302563 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.312428 kernel: Failed to create system directory nfs May 17 00:36:45.312579 kernel: Failed to create system directory nfs May 17 00:36:45.010000 audit[2912]: AVC avc: denied { confidentiality } for pid=2912 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.010000 audit[2912]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56077b5e2a10 a1=16eae4 a2=56076c7d92b0 a3=5 items=0 ppid=56 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:45.349993 kernel: FS-Cache: Netfs 'nfs' registered for caching May 17 00:36:45.010000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.415380 kernel: Failed to create system directory nfs4 May 17 00:36:45.415577 kernel: Failed to create system directory nfs4 May 17 00:36:45.415628 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.425346 kernel: Failed to create system directory nfs4 May 17 00:36:45.425488 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.435282 kernel: Failed to create system directory nfs4 May 17 00:36:45.435451 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.445283 kernel: Failed to create system directory nfs4 May 17 00:36:45.445443 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.450380 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.460383 kernel: Failed to create system directory nfs4 May 17 00:36:45.460531 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.470319 kernel: Failed to create system directory nfs4 May 17 00:36:45.470534 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.480308 kernel: Failed to create system directory nfs4 May 17 00:36:45.480529 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.490281 kernel: Failed to create system directory nfs4 May 17 00:36:45.490421 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.500176 kernel: Failed to create system directory nfs4 May 17 00:36:45.500309 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.505188 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.510152 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.515149 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.520207 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.530192 kernel: Failed to create system directory nfs4 May 17 00:36:45.530281 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.540193 kernel: Failed to create system directory nfs4 May 17 00:36:45.540322 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.550197 kernel: Failed to create system directory nfs4 May 17 00:36:45.550295 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.560365 kernel: Failed to create system directory nfs4 May 17 00:36:45.560549 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.570401 kernel: Failed to create system directory nfs4 May 17 00:36:45.570572 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.580387 kernel: Failed to create system directory nfs4 May 17 00:36:45.580532 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.590399 kernel: Failed to create system directory nfs4 May 17 00:36:45.590544 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.600404 kernel: Failed to create system directory nfs4 May 17 00:36:45.600551 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.610482 kernel: Failed to create system directory nfs4 May 17 00:36:45.610647 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.620481 kernel: Failed to create system directory nfs4 May 17 00:36:45.620657 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.630492 kernel: Failed to create system directory nfs4 May 17 00:36:45.630636 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.640541 kernel: Failed to create system directory nfs4 May 17 00:36:45.640708 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.650563 kernel: Failed to create system directory nfs4 May 17 00:36:45.650729 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.660676 kernel: Failed to create system directory nfs4 May 17 00:36:45.660820 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.670657 kernel: Failed to create system directory nfs4 May 17 00:36:45.670821 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.676083 kubelet[1534]: E0517 00:36:45.675895 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:45.680658 kernel: Failed to create system directory nfs4 May 17 00:36:45.680815 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.690692 kernel: Failed to create system directory nfs4 May 17 00:36:45.690870 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.700646 kernel: Failed to create system directory nfs4 May 17 00:36:45.700774 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.710734 kernel: Failed to create system directory nfs4 May 17 00:36:45.710874 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.720667 kernel: Failed to create system directory nfs4 May 17 00:36:45.720859 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.730810 kernel: Failed to create system directory nfs4 May 17 00:36:45.731015 kernel: Failed to create system directory nfs4 May 17 00:36:45.736061 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.745787 kernel: Failed to create system directory nfs4 May 17 00:36:45.745979 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.755789 kernel: Failed to create system directory nfs4 May 17 00:36:45.755986 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.765847 kernel: Failed to create system directory nfs4 May 17 00:36:45.766015 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.775802 kernel: Failed to create system directory nfs4 May 17 00:36:45.776060 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.785877 kernel: Failed to create system directory nfs4 May 17 00:36:45.786081 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.795840 kernel: Failed to create system directory nfs4 May 17 00:36:45.796012 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.805705 kernel: Failed to create system directory nfs4 May 17 00:36:45.805891 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.810715 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.815711 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.820704 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.825668 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.830650 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.835720 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.840957 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.850721 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.855810 kernel: Failed to create system directory nfs4 May 17 00:36:45.855890 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.865836 kernel: Failed to create system directory nfs4 May 17 00:36:45.865941 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:45.870943 kernel: Failed to create system directory nfs4 May 17 00:36:45.384000 audit[2917]: AVC avc: denied { confidentiality } for pid=2917 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.060993 kernel: NFS: Registering the id_resolver key type May 17 00:36:46.061238 kernel: Key type id_resolver registered May 17 00:36:46.061306 kernel: Key type id_legacy registered May 17 00:36:45.384000 audit[2917]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f071700c010 a1=209404 a2=55f5fbefc2b0 a3=5 items=0 ppid=56 pid=2917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:45.384000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.094147 kernel: Failed to create system directory rpcgss May 17 00:36:46.094347 kernel: Failed to create system directory rpcgss May 17 00:36:46.094401 kernel: Failed to create system directory rpcgss May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.099323 kernel: Failed to create system directory rpcgss May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.104453 kernel: Failed to create system directory rpcgss May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.115088 kernel: Failed to create system directory rpcgss May 17 00:36:46.115269 kernel: Failed to create system directory rpcgss May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.125329 kernel: Failed to create system directory rpcgss May 17 00:36:46.125505 kernel: Failed to create system directory rpcgss May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.135676 kernel: Failed to create system directory rpcgss May 17 00:36:46.135869 kernel: Failed to create system directory rpcgss May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.142716 kernel: Failed to create system directory rpcgss May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.151060 kernel: Failed to create system directory rpcgss May 17 00:36:46.151191 kernel: Failed to create system directory rpcgss May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.161653 kernel: Failed to create system directory rpcgss May 17 00:36:46.161795 kernel: Failed to create system directory rpcgss May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.171871 kernel: Failed to create system directory rpcgss May 17 00:36:46.172119 kernel: Failed to create system directory rpcgss May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.182693 kernel: Failed to create system directory rpcgss May 17 00:36:46.182840 kernel: Failed to create system directory rpcgss May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.192727 kernel: Failed to create system directory rpcgss May 17 00:36:46.192868 kernel: Failed to create system directory rpcgss May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.198068 kernel: Failed to create system directory rpcgss May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.208175 kernel: Failed to create system directory rpcgss May 17 00:36:46.208337 kernel: Failed to create system directory rpcgss May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.078000 audit[2918]: AVC avc: denied { confidentiality } for pid=2918 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:36:46.218613 kernel: Failed to create system directory rpcgss May 17 00:36:46.078000 audit[2918]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f17a6542010 a1=70b64 a2=558eeb8d42b0 a3=5 items=0 ppid=56 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:46.078000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 17 00:36:46.260408 nfsidmap[2925]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' May 17 00:36:46.273360 nfsidmap[2926]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' May 17 00:36:46.290000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2612 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:36:46.290000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2612 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:36:46.291000 audit[1309]: AVC avc: denied { watch_reads } for pid=1309 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2612 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:36:46.291000 audit[1309]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55709f0fac50 a2=10 a3=78fad08b7f1404c3 items=0 ppid=1 pid=1309 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:46.291000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:36:46.291000 audit[1309]: AVC avc: denied { watch_reads } for pid=1309 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2612 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:36:46.291000 audit[1309]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55709f0fac50 a2=10 a3=78fad08b7f1404c3 items=0 ppid=1 pid=1309 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:46.291000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:36:46.291000 audit[1309]: AVC avc: denied { watch_reads } for pid=1309 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2612 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:36:46.291000 audit[1309]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55709f0fac50 a2=10 a3=78fad08b7f1404c3 items=0 ppid=1 pid=1309 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:46.291000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:36:46.292000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2612 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:36:46.445448 env[1204]: time="2025-05-17T00:36:46.445341205Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:999d7f75-a174-4001-a8b5-cfbd5fc3eab0,Namespace:default,Attempt:0,}" May 17 00:36:46.600563 kubelet[1534]: E0517 00:36:46.600482 1534 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:46.676696 kubelet[1534]: E0517 00:36:46.676628 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:46.700140 env[1204]: time="2025-05-17T00:36:46.699986532Z" level=info msg="StopPodSandbox for \"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b\"" May 17 00:36:46.713946 systemd-networkd[1013]: cali5ec59c6bf6e: Link UP May 17 00:36:46.721958 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:36:46.733590 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 17 00:36:46.735330 systemd-networkd[1013]: cali5ec59c6bf6e: Gained carrier May 17 00:36:46.765011 env[1204]: 2025-05-17 00:36:46.616 [INFO][2927] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.12-k8s-test--pod--1-eth0 default 999d7f75-a174-4001-a8b5-cfbd5fc3eab0 1470 0 2025-05-17 00:36:28 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.12 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.12-k8s-test--pod--1-" May 17 00:36:46.765011 env[1204]: 2025-05-17 00:36:46.616 [INFO][2927] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.12-k8s-test--pod--1-eth0" May 17 00:36:46.765011 env[1204]: 2025-05-17 00:36:46.652 [INFO][2940] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b" HandleID="k8s-pod-network.a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b" Workload="10.128.0.12-k8s-test--pod--1-eth0" May 17 00:36:46.765011 env[1204]: 2025-05-17 00:36:46.653 [INFO][2940] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b" HandleID="k8s-pod-network.a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b" Workload="10.128.0.12-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9730), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.12", "pod":"test-pod-1", "timestamp":"2025-05-17 00:36:46.652867022 +0000 UTC"}, Hostname:"10.128.0.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:36:46.765011 env[1204]: 2025-05-17 00:36:46.653 [INFO][2940] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:46.765011 env[1204]: 2025-05-17 00:36:46.653 [INFO][2940] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:46.765011 env[1204]: 2025-05-17 00:36:46.653 [INFO][2940] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.12' May 17 00:36:46.765011 env[1204]: 2025-05-17 00:36:46.665 [INFO][2940] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b" host="10.128.0.12" May 17 00:36:46.765011 env[1204]: 2025-05-17 00:36:46.671 [INFO][2940] ipam/ipam.go 394: Looking up existing affinities for host host="10.128.0.12" May 17 00:36:46.765011 env[1204]: 2025-05-17 00:36:46.679 [INFO][2940] ipam/ipam.go 511: Trying affinity for 192.168.113.192/26 host="10.128.0.12" May 17 00:36:46.765011 env[1204]: 2025-05-17 00:36:46.682 [INFO][2940] ipam/ipam.go 158: Attempting to load block cidr=192.168.113.192/26 host="10.128.0.12" May 17 00:36:46.765011 env[1204]: 2025-05-17 00:36:46.684 [INFO][2940] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.113.192/26 host="10.128.0.12" May 17 00:36:46.765011 env[1204]: 2025-05-17 00:36:46.685 [INFO][2940] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.113.192/26 handle="k8s-pod-network.a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b" host="10.128.0.12" May 17 00:36:46.765011 env[1204]: 2025-05-17 00:36:46.689 [INFO][2940] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b May 17 00:36:46.765011 env[1204]: 2025-05-17 00:36:46.695 [INFO][2940] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.113.192/26 handle="k8s-pod-network.a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b" host="10.128.0.12" May 17 00:36:46.765011 env[1204]: 2025-05-17 00:36:46.704 [INFO][2940] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.113.196/26] block=192.168.113.192/26 handle="k8s-pod-network.a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b" host="10.128.0.12" May 17 00:36:46.765011 env[1204]: 2025-05-17 00:36:46.704 [INFO][2940] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.113.196/26] handle="k8s-pod-network.a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b" host="10.128.0.12" May 17 00:36:46.765011 env[1204]: 2025-05-17 00:36:46.704 [INFO][2940] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:46.765011 env[1204]: 2025-05-17 00:36:46.704 [INFO][2940] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.196/26] IPv6=[] ContainerID="a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b" HandleID="k8s-pod-network.a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b" Workload="10.128.0.12-k8s-test--pod--1-eth0" May 17 00:36:46.765011 env[1204]: 2025-05-17 00:36:46.707 [INFO][2927] cni-plugin/k8s.go 418: Populated endpoint ContainerID="a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.12-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.12-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"999d7f75-a174-4001-a8b5-cfbd5fc3eab0", ResourceVersion:"1470", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.12", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:46.766093 env[1204]: 2025-05-17 00:36:46.708 [INFO][2927] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.113.196/32] ContainerID="a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.12-k8s-test--pod--1-eth0" May 17 00:36:46.766093 env[1204]: 2025-05-17 00:36:46.708 [INFO][2927] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.12-k8s-test--pod--1-eth0" May 17 00:36:46.766093 env[1204]: 2025-05-17 00:36:46.735 [INFO][2927] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.12-k8s-test--pod--1-eth0" May 17 00:36:46.766093 env[1204]: 2025-05-17 00:36:46.736 [INFO][2927] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.12-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.12-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"999d7f75-a174-4001-a8b5-cfbd5fc3eab0", ResourceVersion:"1470", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.12", ContainerID:"a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"2e:96:89:4f:17:51", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:46.766093 env[1204]: 2025-05-17 00:36:46.746 [INFO][2927] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.12-k8s-test--pod--1-eth0" May 17 00:36:46.790000 audit[2969]: NETFILTER_CFG table=filter:78 family=2 entries=40 op=nft_register_chain pid=2969 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:46.790000 audit[2969]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fff06609d00 a2=0 a3=7fff06609cec items=0 ppid=2206 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:46.790000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:46.799241 env[1204]: time="2025-05-17T00:36:46.799144348Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:46.799561 env[1204]: time="2025-05-17T00:36:46.799484312Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:46.799757 env[1204]: time="2025-05-17T00:36:46.799702439Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:46.800180 env[1204]: time="2025-05-17T00:36:46.800126696Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b pid=2976 runtime=io.containerd.runc.v2 May 17 00:36:46.838604 systemd[1]: Started cri-containerd-a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b.scope. May 17 00:36:46.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.875000 audit: BPF prog-id=126 op=LOAD May 17 00:36:46.876000 audit[2988]: AVC avc: denied { bpf } for pid=2988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2976 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:46.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133376536323633333233366531646536373130363062386632376562 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { perfmon } for pid=2988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2976 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:46.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133376536323633333233366531646536373130363062386632376562 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { bpf } for pid=2988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { bpf } for pid=2988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { bpf } for pid=2988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { perfmon } for pid=2988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { perfmon } for pid=2988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { perfmon } for pid=2988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { perfmon } for pid=2988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { perfmon } for pid=2988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { bpf } for pid=2988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { bpf } for pid=2988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit: BPF prog-id=127 op=LOAD May 17 00:36:46.876000 audit[2988]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032dba0 items=0 ppid=2976 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:46.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133376536323633333233366531646536373130363062386632376562 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { bpf } for pid=2988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { bpf } for pid=2988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { perfmon } for pid=2988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { perfmon } for pid=2988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { perfmon } for pid=2988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { perfmon } for pid=2988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { perfmon } for pid=2988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { bpf } for pid=2988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { bpf } for pid=2988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit: BPF prog-id=128 op=LOAD May 17 00:36:46.876000 audit[2988]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032dbe8 items=0 ppid=2976 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:46.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133376536323633333233366531646536373130363062386632376562 May 17 00:36:46.876000 audit: BPF prog-id=128 op=UNLOAD May 17 00:36:46.876000 audit: BPF prog-id=127 op=UNLOAD May 17 00:36:46.876000 audit[2988]: AVC avc: denied { bpf } for pid=2988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { bpf } for pid=2988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { bpf } for pid=2988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { perfmon } for pid=2988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { perfmon } for pid=2988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { perfmon } for pid=2988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { perfmon } for pid=2988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { perfmon } for pid=2988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { bpf } for pid=2988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit[2988]: AVC avc: denied { bpf } for pid=2988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.876000 audit: BPF prog-id=129 op=LOAD May 17 00:36:46.876000 audit[2988]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00032dff8 items=0 ppid=2976 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:46.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133376536323633333233366531646536373130363062386632376562 May 17 00:36:46.940598 env[1204]: 2025-05-17 00:36:46.829 [WARNING][2957] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.12-k8s-csi--node--driver--pt9zn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a1c914fd-f7a4-4351-b87f-b130b6eea600", ResourceVersion:"1333", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.12", ContainerID:"006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922", Pod:"csi-node-driver-pt9zn", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.113.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0660c6cfd17", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:46.940598 env[1204]: 2025-05-17 00:36:46.829 [INFO][2957] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" May 17 00:36:46.940598 env[1204]: 2025-05-17 00:36:46.829 [INFO][2957] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" iface="eth0" netns="" May 17 00:36:46.940598 env[1204]: 2025-05-17 00:36:46.829 [INFO][2957] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" May 17 00:36:46.940598 env[1204]: 2025-05-17 00:36:46.829 [INFO][2957] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" May 17 00:36:46.940598 env[1204]: 2025-05-17 00:36:46.903 [INFO][3001] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" HandleID="k8s-pod-network.d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" Workload="10.128.0.12-k8s-csi--node--driver--pt9zn-eth0" May 17 00:36:46.940598 env[1204]: 2025-05-17 00:36:46.904 [INFO][3001] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:46.940598 env[1204]: 2025-05-17 00:36:46.904 [INFO][3001] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:46.940598 env[1204]: 2025-05-17 00:36:46.920 [WARNING][3001] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" HandleID="k8s-pod-network.d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" Workload="10.128.0.12-k8s-csi--node--driver--pt9zn-eth0" May 17 00:36:46.940598 env[1204]: 2025-05-17 00:36:46.920 [INFO][3001] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" HandleID="k8s-pod-network.d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" Workload="10.128.0.12-k8s-csi--node--driver--pt9zn-eth0" May 17 00:36:46.940598 env[1204]: 2025-05-17 00:36:46.930 [INFO][3001] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:46.940598 env[1204]: 2025-05-17 00:36:46.936 [INFO][2957] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" May 17 00:36:46.941990 env[1204]: time="2025-05-17T00:36:46.941882844Z" level=info msg="TearDown network for sandbox \"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b\" successfully" May 17 00:36:46.942203 env[1204]: time="2025-05-17T00:36:46.942163593Z" level=info msg="StopPodSandbox for \"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b\" returns successfully" May 17 00:36:46.943472 env[1204]: time="2025-05-17T00:36:46.943431326Z" level=info msg="RemovePodSandbox for \"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b\"" May 17 00:36:46.943933 env[1204]: time="2025-05-17T00:36:46.943650619Z" level=info msg="Forcibly stopping sandbox \"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b\"" May 17 00:36:46.969176 env[1204]: time="2025-05-17T00:36:46.962604101Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:999d7f75-a174-4001-a8b5-cfbd5fc3eab0,Namespace:default,Attempt:0,} returns sandbox id \"a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b\"" May 17 00:36:46.971644 env[1204]: time="2025-05-17T00:36:46.971574777Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 17 00:36:47.053831 env[1204]: 2025-05-17 00:36:47.006 [WARNING][3031] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.12-k8s-csi--node--driver--pt9zn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a1c914fd-f7a4-4351-b87f-b130b6eea600", ResourceVersion:"1333", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.12", ContainerID:"006400500e68ae4f3cb2c13980293c9072dfc3a1b86723462a55e30207399922", Pod:"csi-node-driver-pt9zn", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.113.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0660c6cfd17", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:47.053831 env[1204]: 2025-05-17 00:36:47.006 [INFO][3031] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" May 17 00:36:47.053831 env[1204]: 2025-05-17 00:36:47.006 [INFO][3031] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" iface="eth0" netns="" May 17 00:36:47.053831 env[1204]: 2025-05-17 00:36:47.006 [INFO][3031] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" May 17 00:36:47.053831 env[1204]: 2025-05-17 00:36:47.006 [INFO][3031] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" May 17 00:36:47.053831 env[1204]: 2025-05-17 00:36:47.036 [INFO][3038] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" HandleID="k8s-pod-network.d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" Workload="10.128.0.12-k8s-csi--node--driver--pt9zn-eth0" May 17 00:36:47.053831 env[1204]: 2025-05-17 00:36:47.037 [INFO][3038] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:47.053831 env[1204]: 2025-05-17 00:36:47.037 [INFO][3038] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:47.053831 env[1204]: 2025-05-17 00:36:47.047 [WARNING][3038] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" HandleID="k8s-pod-network.d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" Workload="10.128.0.12-k8s-csi--node--driver--pt9zn-eth0" May 17 00:36:47.053831 env[1204]: 2025-05-17 00:36:47.047 [INFO][3038] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" HandleID="k8s-pod-network.d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" Workload="10.128.0.12-k8s-csi--node--driver--pt9zn-eth0" May 17 00:36:47.053831 env[1204]: 2025-05-17 00:36:47.050 [INFO][3038] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:47.053831 env[1204]: 2025-05-17 00:36:47.052 [INFO][3031] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b" May 17 00:36:47.054857 env[1204]: time="2025-05-17T00:36:47.053922188Z" level=info msg="TearDown network for sandbox \"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b\" successfully" May 17 00:36:47.058419 env[1204]: time="2025-05-17T00:36:47.058350123Z" level=info msg="RemovePodSandbox \"d96de576ca27e6bbd3d88a430396967025c541b390082eea5526d6b1cc061c0b\" returns successfully" May 17 00:36:47.059121 env[1204]: time="2025-05-17T00:36:47.059077998Z" level=info msg="StopPodSandbox for \"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365\"" May 17 00:36:47.161957 env[1204]: 2025-05-17 00:36:47.111 [WARNING][3052] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"bea7c7a4-5c41-4d78-a68e-195386023e27", ResourceVersion:"1356", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.12", ContainerID:"d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052", Pod:"nginx-deployment-7fcdb87857-2mfff", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali40dd888c1d3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:47.161957 env[1204]: 2025-05-17 00:36:47.112 [INFO][3052] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" May 17 00:36:47.161957 env[1204]: 2025-05-17 00:36:47.112 [INFO][3052] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" iface="eth0" netns="" May 17 00:36:47.161957 env[1204]: 2025-05-17 00:36:47.112 [INFO][3052] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" May 17 00:36:47.161957 env[1204]: 2025-05-17 00:36:47.112 [INFO][3052] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" May 17 00:36:47.161957 env[1204]: 2025-05-17 00:36:47.145 [INFO][3059] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" HandleID="k8s-pod-network.89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" Workload="10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0" May 17 00:36:47.161957 env[1204]: 2025-05-17 00:36:47.146 [INFO][3059] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:47.161957 env[1204]: 2025-05-17 00:36:47.146 [INFO][3059] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:47.161957 env[1204]: 2025-05-17 00:36:47.156 [WARNING][3059] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" HandleID="k8s-pod-network.89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" Workload="10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0" May 17 00:36:47.161957 env[1204]: 2025-05-17 00:36:47.156 [INFO][3059] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" HandleID="k8s-pod-network.89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" Workload="10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0" May 17 00:36:47.161957 env[1204]: 2025-05-17 00:36:47.158 [INFO][3059] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:47.161957 env[1204]: 2025-05-17 00:36:47.160 [INFO][3052] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" May 17 00:36:47.162831 env[1204]: time="2025-05-17T00:36:47.162755244Z" level=info msg="TearDown network for sandbox \"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365\" successfully" May 17 00:36:47.163016 env[1204]: time="2025-05-17T00:36:47.162839498Z" level=info msg="StopPodSandbox for \"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365\" returns successfully" May 17 00:36:47.163589 env[1204]: time="2025-05-17T00:36:47.163541757Z" level=info msg="RemovePodSandbox for \"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365\"" May 17 00:36:47.163714 env[1204]: time="2025-05-17T00:36:47.163594737Z" level=info msg="Forcibly stopping sandbox \"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365\"" May 17 00:36:47.176374 env[1204]: time="2025-05-17T00:36:47.176311868Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:47.179015 env[1204]: time="2025-05-17T00:36:47.178958228Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:47.183231 env[1204]: time="2025-05-17T00:36:47.183183256Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:47.187438 env[1204]: time="2025-05-17T00:36:47.187376714Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:47.190633 env[1204]: time="2025-05-17T00:36:47.188203176Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 17 00:36:47.201488 env[1204]: time="2025-05-17T00:36:47.201423456Z" level=info msg="CreateContainer within sandbox \"a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 17 00:36:47.224724 env[1204]: time="2025-05-17T00:36:47.224562630Z" level=info msg="CreateContainer within sandbox \"a37e62633236e1de671060b8f27eb5e970afbcf6201f307102056184efe58e0b\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"23cdd16038423331a5d926bb1d75a35ee9c1968c83a11ed098d0989101796c5c\"" May 17 00:36:47.227145 env[1204]: time="2025-05-17T00:36:47.227090807Z" level=info msg="StartContainer for \"23cdd16038423331a5d926bb1d75a35ee9c1968c83a11ed098d0989101796c5c\"" May 17 00:36:47.265650 systemd[1]: Started cri-containerd-23cdd16038423331a5d926bb1d75a35ee9c1968c83a11ed098d0989101796c5c.scope. May 17 00:36:47.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.302000 audit: BPF prog-id=130 op=LOAD May 17 00:36:47.305000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.305000 audit[3097]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2976 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233636464313630333834323333333161356439323662623164373561 May 17 00:36:47.306000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.306000 audit[3097]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2976 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233636464313630333834323333333161356439323662623164373561 May 17 00:36:47.307000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.307000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.307000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.307000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.307000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.307000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.307000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.307000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.307000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.307000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.307000 audit: BPF prog-id=131 op=LOAD May 17 00:36:47.307000 audit[3097]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003be9d0 items=0 ppid=2976 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233636464313630333834323333333161356439323662623164373561 May 17 00:36:47.309000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.309000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.309000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.309000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.309000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.309000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.309000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.309000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.309000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.309000 audit: BPF prog-id=132 op=LOAD May 17 00:36:47.309000 audit[3097]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003bea18 items=0 ppid=2976 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233636464313630333834323333333161356439323662623164373561 May 17 00:36:47.310000 audit: BPF prog-id=132 op=UNLOAD May 17 00:36:47.311000 audit: BPF prog-id=131 op=UNLOAD May 17 00:36:47.311000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.311000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.311000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.311000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.311000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.311000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.311000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.311000 audit[3097]: AVC avc: denied { perfmon } for pid=3097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.311000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.311000 audit[3097]: AVC avc: denied { bpf } for pid=3097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:47.311000 audit: BPF prog-id=133 op=LOAD May 17 00:36:47.311000 audit[3097]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003bee28 items=0 ppid=2976 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233636464313630333834323333333161356439323662623164373561 May 17 00:36:47.341379 env[1204]: time="2025-05-17T00:36:47.341309674Z" level=info msg="StartContainer for \"23cdd16038423331a5d926bb1d75a35ee9c1968c83a11ed098d0989101796c5c\" returns successfully" May 17 00:36:47.344709 env[1204]: 2025-05-17 00:36:47.237 [WARNING][3074] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"bea7c7a4-5c41-4d78-a68e-195386023e27", ResourceVersion:"1356", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.12", ContainerID:"d59c188598baf996ff90a925b362c5fa6ab00f42a8333534177b7258c4eaa052", Pod:"nginx-deployment-7fcdb87857-2mfff", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali40dd888c1d3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:47.344709 env[1204]: 2025-05-17 00:36:47.238 [INFO][3074] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" May 17 00:36:47.344709 env[1204]: 2025-05-17 00:36:47.238 [INFO][3074] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" iface="eth0" netns="" May 17 00:36:47.344709 env[1204]: 2025-05-17 00:36:47.238 [INFO][3074] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" May 17 00:36:47.344709 env[1204]: 2025-05-17 00:36:47.238 [INFO][3074] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" May 17 00:36:47.344709 env[1204]: 2025-05-17 00:36:47.313 [INFO][3092] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" HandleID="k8s-pod-network.89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" Workload="10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0" May 17 00:36:47.344709 env[1204]: 2025-05-17 00:36:47.314 [INFO][3092] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:47.344709 env[1204]: 2025-05-17 00:36:47.314 [INFO][3092] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:47.344709 env[1204]: 2025-05-17 00:36:47.329 [WARNING][3092] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" HandleID="k8s-pod-network.89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" Workload="10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0" May 17 00:36:47.344709 env[1204]: 2025-05-17 00:36:47.329 [INFO][3092] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" HandleID="k8s-pod-network.89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" Workload="10.128.0.12-k8s-nginx--deployment--7fcdb87857--2mfff-eth0" May 17 00:36:47.344709 env[1204]: 2025-05-17 00:36:47.336 [INFO][3092] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:47.344709 env[1204]: 2025-05-17 00:36:47.340 [INFO][3074] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365" May 17 00:36:47.346853 env[1204]: time="2025-05-17T00:36:47.345826366Z" level=info msg="TearDown network for sandbox \"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365\" successfully" May 17 00:36:47.351584 env[1204]: time="2025-05-17T00:36:47.351458795Z" level=info msg="RemovePodSandbox \"89816b9b553009d97518c32a4ca295f6944d0ce3812ee4124c079b4554529365\" returns successfully" May 17 00:36:47.677342 kubelet[1534]: E0517 00:36:47.677252 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:48.450691 systemd-networkd[1013]: cali5ec59c6bf6e: Gained IPv6LL May 17 00:36:48.678384 kubelet[1534]: E0517 00:36:48.678310 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:49.679074 kubelet[1534]: E0517 00:36:49.678989 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:50.679843 kubelet[1534]: E0517 00:36:50.679761 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:51.680942 kubelet[1534]: E0517 00:36:51.680856 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:52.681314 kubelet[1534]: E0517 00:36:52.681249 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:53.682273 kubelet[1534]: E0517 00:36:53.682190 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:36:54.682697 kubelet[1534]: E0517 00:36:54.682610 1534 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"