May 17 00:40:31.070024 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 00:40:31.070066 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:40:31.070079 kernel: BIOS-provided physical RAM map: May 17 00:40:31.070087 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 17 00:40:31.070139 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 17 00:40:31.070147 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 17 00:40:31.070155 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable May 17 00:40:31.070163 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved May 17 00:40:31.070176 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 17 00:40:31.070187 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved May 17 00:40:31.070197 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 17 00:40:31.070207 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 17 00:40:31.070217 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved May 17 00:40:31.070226 kernel: NX (Execute Disable) protection: active May 17 00:40:31.070240 kernel: SMBIOS 2.8 present. May 17 00:40:31.070250 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 May 17 00:40:31.070260 kernel: Hypervisor detected: KVM May 17 00:40:31.070270 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 17 00:40:31.070285 kernel: kvm-clock: cpu 0, msr 3919a001, primary cpu clock May 17 00:40:31.070295 kernel: kvm-clock: using sched offset of 3272797182 cycles May 17 00:40:31.070306 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 17 00:40:31.070317 kernel: tsc: Detected 2794.748 MHz processor May 17 00:40:31.070328 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 00:40:31.070342 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 00:40:31.070354 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 May 17 00:40:31.070364 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 00:40:31.070375 kernel: Using GB pages for direct mapping May 17 00:40:31.070385 kernel: ACPI: Early table checksum verification disabled May 17 00:40:31.070396 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) May 17 00:40:31.070405 kernel: ACPI: RSDT 0x000000009CFE2408 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:40:31.070413 kernel: ACPI: FACP 0x000000009CFE21E8 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:40:31.070422 kernel: ACPI: DSDT 0x000000009CFE0040 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:40:31.070433 kernel: ACPI: FACS 0x000000009CFE0000 000040 May 17 00:40:31.070441 kernel: ACPI: APIC 0x000000009CFE22DC 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:40:31.070450 kernel: ACPI: HPET 0x000000009CFE236C 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:40:31.070458 kernel: ACPI: MCFG 0x000000009CFE23A4 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:40:31.070467 kernel: ACPI: WAET 0x000000009CFE23E0 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:40:31.070477 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21e8-0x9cfe22db] May 17 00:40:31.070486 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21e7] May 17 00:40:31.070495 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] May 17 00:40:31.070510 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22dc-0x9cfe236b] May 17 00:40:31.070520 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe236c-0x9cfe23a3] May 17 00:40:31.070529 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23a4-0x9cfe23df] May 17 00:40:31.070539 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23e0-0x9cfe2407] May 17 00:40:31.070549 kernel: No NUMA configuration found May 17 00:40:31.070558 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] May 17 00:40:31.070569 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] May 17 00:40:31.070578 kernel: Zone ranges: May 17 00:40:31.070587 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 00:40:31.070596 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] May 17 00:40:31.070605 kernel: Normal empty May 17 00:40:31.070614 kernel: Movable zone start for each node May 17 00:40:31.070623 kernel: Early memory node ranges May 17 00:40:31.070632 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 17 00:40:31.070641 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] May 17 00:40:31.070653 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] May 17 00:40:31.070666 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:40:31.070675 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 17 00:40:31.070683 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges May 17 00:40:31.070692 kernel: ACPI: PM-Timer IO Port: 0x608 May 17 00:40:31.070700 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 17 00:40:31.070708 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 17 00:40:31.070717 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 17 00:40:31.070725 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 17 00:40:31.070734 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 17 00:40:31.070747 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 17 00:40:31.070756 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 17 00:40:31.070765 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 00:40:31.070773 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 17 00:40:31.070782 kernel: TSC deadline timer available May 17 00:40:31.070790 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 17 00:40:31.070799 kernel: kvm-guest: KVM setup pv remote TLB flush May 17 00:40:31.070808 kernel: kvm-guest: setup PV sched yield May 17 00:40:31.070817 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices May 17 00:40:31.070827 kernel: Booting paravirtualized kernel on KVM May 17 00:40:31.070836 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 00:40:31.070846 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 17 00:40:31.070855 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 17 00:40:31.070864 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 17 00:40:31.070872 kernel: pcpu-alloc: [0] 0 1 2 3 May 17 00:40:31.070881 kernel: kvm-guest: setup async PF for cpu 0 May 17 00:40:31.070889 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 May 17 00:40:31.070898 kernel: kvm-guest: PV spinlocks enabled May 17 00:40:31.070909 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 17 00:40:31.070918 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 May 17 00:40:31.070926 kernel: Policy zone: DMA32 May 17 00:40:31.070937 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:40:31.070946 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:40:31.070955 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 17 00:40:31.070964 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 17 00:40:31.070973 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:40:31.070984 kernel: Memory: 2436696K/2571752K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 134796K reserved, 0K cma-reserved) May 17 00:40:31.070993 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 17 00:40:31.071002 kernel: ftrace: allocating 34585 entries in 136 pages May 17 00:40:31.071010 kernel: ftrace: allocated 136 pages with 2 groups May 17 00:40:31.071033 kernel: rcu: Hierarchical RCU implementation. May 17 00:40:31.071042 kernel: rcu: RCU event tracing is enabled. May 17 00:40:31.071078 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 17 00:40:31.071089 kernel: Rude variant of Tasks RCU enabled. May 17 00:40:31.071098 kernel: Tracing variant of Tasks RCU enabled. May 17 00:40:31.071111 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:40:31.071122 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 17 00:40:31.071133 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 17 00:40:31.071144 kernel: random: crng init done May 17 00:40:31.071155 kernel: Console: colour VGA+ 80x25 May 17 00:40:31.071166 kernel: printk: console [ttyS0] enabled May 17 00:40:31.071203 kernel: ACPI: Core revision 20210730 May 17 00:40:31.071215 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 17 00:40:31.071226 kernel: APIC: Switch to symmetric I/O mode setup May 17 00:40:31.071240 kernel: x2apic enabled May 17 00:40:31.071250 kernel: Switched APIC routing to physical x2apic. May 17 00:40:31.071262 kernel: kvm-guest: setup PV IPIs May 17 00:40:31.071271 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 17 00:40:31.071281 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 17 00:40:31.071293 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 17 00:40:31.071302 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 17 00:40:31.071311 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 17 00:40:31.071320 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 17 00:40:31.071337 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 00:40:31.071347 kernel: Spectre V2 : Mitigation: Retpolines May 17 00:40:31.071356 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 17 00:40:31.071367 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 17 00:40:31.071377 kernel: RETBleed: Mitigation: untrained return thunk May 17 00:40:31.071386 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 17 00:40:31.071396 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 17 00:40:31.071405 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 00:40:31.071415 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 00:40:31.071426 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 00:40:31.071436 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 00:40:31.071445 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 17 00:40:31.071455 kernel: Freeing SMP alternatives memory: 32K May 17 00:40:31.071464 kernel: pid_max: default: 32768 minimum: 301 May 17 00:40:31.071474 kernel: LSM: Security Framework initializing May 17 00:40:31.071483 kernel: SELinux: Initializing. May 17 00:40:31.071494 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 17 00:40:31.071504 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 17 00:40:31.071513 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 17 00:40:31.071523 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 17 00:40:31.071532 kernel: ... version: 0 May 17 00:40:31.071542 kernel: ... bit width: 48 May 17 00:40:31.071551 kernel: ... generic registers: 6 May 17 00:40:31.071560 kernel: ... value mask: 0000ffffffffffff May 17 00:40:31.071570 kernel: ... max period: 00007fffffffffff May 17 00:40:31.071580 kernel: ... fixed-purpose events: 0 May 17 00:40:31.071590 kernel: ... event mask: 000000000000003f May 17 00:40:31.071599 kernel: signal: max sigframe size: 1776 May 17 00:40:31.071608 kernel: rcu: Hierarchical SRCU implementation. May 17 00:40:31.071618 kernel: smp: Bringing up secondary CPUs ... May 17 00:40:31.071627 kernel: x86: Booting SMP configuration: May 17 00:40:31.071636 kernel: .... node #0, CPUs: #1 May 17 00:40:31.071646 kernel: kvm-clock: cpu 1, msr 3919a041, secondary cpu clock May 17 00:40:31.071655 kernel: kvm-guest: setup async PF for cpu 1 May 17 00:40:31.071664 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 May 17 00:40:31.071675 kernel: #2 May 17 00:40:31.071685 kernel: kvm-clock: cpu 2, msr 3919a081, secondary cpu clock May 17 00:40:31.071694 kernel: kvm-guest: setup async PF for cpu 2 May 17 00:40:31.071703 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 May 17 00:40:31.071712 kernel: #3 May 17 00:40:31.071725 kernel: kvm-clock: cpu 3, msr 3919a0c1, secondary cpu clock May 17 00:40:31.071734 kernel: kvm-guest: setup async PF for cpu 3 May 17 00:40:31.071743 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 May 17 00:40:31.071752 kernel: smp: Brought up 1 node, 4 CPUs May 17 00:40:31.071763 kernel: smpboot: Max logical packages: 1 May 17 00:40:31.071773 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 17 00:40:31.071783 kernel: devtmpfs: initialized May 17 00:40:31.071792 kernel: x86/mm: Memory block size: 128MB May 17 00:40:31.071802 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:40:31.071811 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 17 00:40:31.071820 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:40:31.071830 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:40:31.071839 kernel: audit: initializing netlink subsys (disabled) May 17 00:40:31.071850 kernel: audit: type=2000 audit(1747442430.430:1): state=initialized audit_enabled=0 res=1 May 17 00:40:31.071859 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:40:31.071869 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 00:40:31.071878 kernel: cpuidle: using governor menu May 17 00:40:31.071888 kernel: ACPI: bus type PCI registered May 17 00:40:31.071897 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:40:31.071906 kernel: dca service started, version 1.12.1 May 17 00:40:31.071916 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 17 00:40:31.071926 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 17 00:40:31.071937 kernel: PCI: Using configuration type 1 for base access May 17 00:40:31.071946 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 00:40:31.071956 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 00:40:31.071965 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:40:31.071974 kernel: ACPI: Added _OSI(Module Device) May 17 00:40:31.071984 kernel: ACPI: Added _OSI(Processor Device) May 17 00:40:31.071993 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:40:31.072003 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:40:31.072012 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:40:31.072032 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:40:31.072041 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:40:31.072063 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 17 00:40:31.072074 kernel: ACPI: Interpreter enabled May 17 00:40:31.072083 kernel: ACPI: PM: (supports S0 S3 S5) May 17 00:40:31.072092 kernel: ACPI: Using IOAPIC for interrupt routing May 17 00:40:31.072102 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 00:40:31.072111 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 17 00:40:31.072121 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 17 00:40:31.072357 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 17 00:40:31.072527 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 17 00:40:31.072660 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 17 00:40:31.072676 kernel: PCI host bridge to bus 0000:00 May 17 00:40:31.072799 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 17 00:40:31.072894 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 17 00:40:31.072987 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 17 00:40:31.073107 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 17 00:40:31.073203 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 17 00:40:31.073313 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] May 17 00:40:31.073419 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 17 00:40:31.073564 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 17 00:40:31.073688 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 17 00:40:31.073799 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] May 17 00:40:31.073900 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] May 17 00:40:31.074002 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] May 17 00:40:31.074139 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 17 00:40:31.074282 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 17 00:40:31.074387 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] May 17 00:40:31.074502 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] May 17 00:40:31.074604 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] May 17 00:40:31.074716 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 17 00:40:31.074813 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] May 17 00:40:31.074911 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] May 17 00:40:31.075034 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] May 17 00:40:31.075210 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 17 00:40:31.075320 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] May 17 00:40:31.075416 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] May 17 00:40:31.075511 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] May 17 00:40:31.075605 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] May 17 00:40:31.075719 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 17 00:40:31.075816 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 17 00:40:31.075978 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 17 00:40:31.076140 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] May 17 00:40:31.076303 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] May 17 00:40:31.076445 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 17 00:40:31.076545 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] May 17 00:40:31.076559 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 17 00:40:31.076569 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 17 00:40:31.076579 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 17 00:40:31.076589 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 17 00:40:31.076603 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 17 00:40:31.076613 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 17 00:40:31.076623 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 17 00:40:31.076633 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 17 00:40:31.076643 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 17 00:40:31.076653 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 17 00:40:31.076663 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 17 00:40:31.076673 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 17 00:40:31.076683 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 17 00:40:31.076694 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 17 00:40:31.076704 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 17 00:40:31.076714 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 17 00:40:31.076724 kernel: iommu: Default domain type: Translated May 17 00:40:31.076734 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 00:40:31.076834 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 17 00:40:31.076933 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 17 00:40:31.077045 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 17 00:40:31.077079 kernel: vgaarb: loaded May 17 00:40:31.077090 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:40:31.077100 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:40:31.077112 kernel: PTP clock support registered May 17 00:40:31.077124 kernel: PCI: Using ACPI for IRQ routing May 17 00:40:31.077137 kernel: PCI: pci_cache_line_size set to 64 bytes May 17 00:40:31.077149 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 17 00:40:31.077161 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] May 17 00:40:31.077174 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 17 00:40:31.077188 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 17 00:40:31.077201 kernel: clocksource: Switched to clocksource kvm-clock May 17 00:40:31.077213 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:40:31.077226 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:40:31.077238 kernel: pnp: PnP ACPI init May 17 00:40:31.077377 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 17 00:40:31.077393 kernel: pnp: PnP ACPI: found 6 devices May 17 00:40:31.077404 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 00:40:31.077417 kernel: NET: Registered PF_INET protocol family May 17 00:40:31.077427 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 17 00:40:31.077437 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 17 00:40:31.077447 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:40:31.077457 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 17 00:40:31.077467 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 17 00:40:31.077477 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 17 00:40:31.077486 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 17 00:40:31.077496 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 17 00:40:31.077508 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:40:31.077518 kernel: NET: Registered PF_XDP protocol family May 17 00:40:31.077612 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 17 00:40:31.077703 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 17 00:40:31.077791 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 17 00:40:31.077880 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 17 00:40:31.077962 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 17 00:40:31.078072 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] May 17 00:40:31.078090 kernel: PCI: CLS 0 bytes, default 64 May 17 00:40:31.078101 kernel: Initialise system trusted keyrings May 17 00:40:31.078111 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 17 00:40:31.078121 kernel: Key type asymmetric registered May 17 00:40:31.078130 kernel: Asymmetric key parser 'x509' registered May 17 00:40:31.078140 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:40:31.078150 kernel: io scheduler mq-deadline registered May 17 00:40:31.078160 kernel: io scheduler kyber registered May 17 00:40:31.078169 kernel: io scheduler bfq registered May 17 00:40:31.078179 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 00:40:31.078192 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 17 00:40:31.078202 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 17 00:40:31.078212 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 17 00:40:31.078222 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:40:31.078232 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 00:40:31.078243 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 17 00:40:31.078253 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 17 00:40:31.078263 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 17 00:40:31.078379 kernel: rtc_cmos 00:04: RTC can wake from S4 May 17 00:40:31.078396 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 17 00:40:31.078482 kernel: rtc_cmos 00:04: registered as rtc0 May 17 00:40:31.078568 kernel: rtc_cmos 00:04: setting system clock to 2025-05-17T00:40:30 UTC (1747442430) May 17 00:40:31.078653 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 17 00:40:31.078666 kernel: NET: Registered PF_INET6 protocol family May 17 00:40:31.078676 kernel: Segment Routing with IPv6 May 17 00:40:31.078686 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:40:31.078696 kernel: NET: Registered PF_PACKET protocol family May 17 00:40:31.078709 kernel: Key type dns_resolver registered May 17 00:40:31.078719 kernel: IPI shorthand broadcast: enabled May 17 00:40:31.078729 kernel: sched_clock: Marking stable (480267021, 105399192)->(720176005, -134509792) May 17 00:40:31.078739 kernel: registered taskstats version 1 May 17 00:40:31.078750 kernel: Loading compiled-in X.509 certificates May 17 00:40:31.078760 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 00:40:31.078770 kernel: Key type .fscrypt registered May 17 00:40:31.078780 kernel: Key type fscrypt-provisioning registered May 17 00:40:31.078790 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:40:31.078801 kernel: ima: Allocated hash algorithm: sha1 May 17 00:40:31.078811 kernel: ima: No architecture policies found May 17 00:40:31.078820 kernel: clk: Disabling unused clocks May 17 00:40:31.078829 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 00:40:31.078839 kernel: Write protecting the kernel read-only data: 28672k May 17 00:40:31.078848 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 00:40:31.078881 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 00:40:31.078892 kernel: Run /init as init process May 17 00:40:31.078905 kernel: with arguments: May 17 00:40:31.078915 kernel: /init May 17 00:40:31.078924 kernel: with environment: May 17 00:40:31.078933 kernel: HOME=/ May 17 00:40:31.078943 kernel: TERM=linux May 17 00:40:31.078952 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:40:31.078965 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:40:31.078978 systemd[1]: Detected virtualization kvm. May 17 00:40:31.078991 systemd[1]: Detected architecture x86-64. May 17 00:40:31.079001 systemd[1]: Running in initrd. May 17 00:40:31.079011 systemd[1]: No hostname configured, using default hostname. May 17 00:40:31.079032 systemd[1]: Hostname set to . May 17 00:40:31.079043 systemd[1]: Initializing machine ID from VM UUID. May 17 00:40:31.079076 systemd[1]: Queued start job for default target initrd.target. May 17 00:40:31.079086 systemd[1]: Started systemd-ask-password-console.path. May 17 00:40:31.079096 systemd[1]: Reached target cryptsetup.target. May 17 00:40:31.079106 systemd[1]: Reached target paths.target. May 17 00:40:31.079119 systemd[1]: Reached target slices.target. May 17 00:40:31.079145 systemd[1]: Reached target swap.target. May 17 00:40:31.079158 systemd[1]: Reached target timers.target. May 17 00:40:31.079169 systemd[1]: Listening on iscsid.socket. May 17 00:40:31.079180 systemd[1]: Listening on iscsiuio.socket. May 17 00:40:31.079193 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:40:31.079206 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:40:31.079220 systemd[1]: Listening on systemd-journald.socket. May 17 00:40:31.079233 systemd[1]: Listening on systemd-networkd.socket. May 17 00:40:31.079247 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:40:31.079261 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:40:31.079274 systemd[1]: Reached target sockets.target. May 17 00:40:31.079288 systemd[1]: Starting kmod-static-nodes.service... May 17 00:40:31.079301 systemd[1]: Finished network-cleanup.service. May 17 00:40:31.079319 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:40:31.079333 systemd[1]: Starting systemd-journald.service... May 17 00:40:31.079347 systemd[1]: Starting systemd-modules-load.service... May 17 00:40:31.079361 systemd[1]: Starting systemd-resolved.service... May 17 00:40:31.079374 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:40:31.079388 systemd[1]: Finished kmod-static-nodes.service. May 17 00:40:31.079402 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:40:31.079414 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:40:31.079426 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:40:31.079442 systemd-journald[197]: Journal started May 17 00:40:31.079504 systemd-journald[197]: Runtime Journal (/run/log/journal/4aa8ed7108c0420f8fbca6f1ad967a64) is 6.0M, max 48.5M, 42.5M free. May 17 00:40:31.072623 systemd-modules-load[198]: Inserted module 'overlay' May 17 00:40:31.110817 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:40:31.110839 kernel: Bridge firewalling registered May 17 00:40:31.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:31.094841 systemd-resolved[199]: Positive Trust Anchors: May 17 00:40:31.115597 kernel: audit: type=1130 audit(1747442431.110:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:31.115615 systemd[1]: Started systemd-journald.service. May 17 00:40:31.094857 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:40:31.094884 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:40:31.097079 systemd-resolved[199]: Defaulting to hostname 'linux'. May 17 00:40:31.110768 systemd-modules-load[198]: Inserted module 'br_netfilter' May 17 00:40:31.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:31.125259 systemd[1]: Started systemd-resolved.service. May 17 00:40:31.130073 kernel: audit: type=1130 audit(1747442431.125:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:31.130099 kernel: audit: type=1130 audit(1747442431.129:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:31.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:31.130337 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:40:31.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:31.135457 systemd[1]: Reached target nss-lookup.target. May 17 00:40:31.140860 kernel: audit: type=1130 audit(1747442431.135:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:31.140875 kernel: SCSI subsystem initialized May 17 00:40:31.141596 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:40:31.151794 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:40:31.151827 kernel: device-mapper: uevent: version 1.0.3 May 17 00:40:31.151839 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:40:31.155452 systemd-modules-load[198]: Inserted module 'dm_multipath' May 17 00:40:31.166412 kernel: audit: type=1130 audit(1747442431.156:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:31.166436 kernel: audit: type=1130 audit(1747442431.156:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:31.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:31.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:31.155579 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:40:31.156730 systemd[1]: Finished systemd-modules-load.service. May 17 00:40:31.161406 systemd[1]: Starting dracut-cmdline.service... May 17 00:40:31.165077 systemd[1]: Starting systemd-sysctl.service... May 17 00:40:31.174415 systemd[1]: Finished systemd-sysctl.service. May 17 00:40:31.179100 kernel: audit: type=1130 audit(1747442431.174:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:31.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:31.180333 dracut-cmdline[219]: dracut-dracut-053 May 17 00:40:31.183203 dracut-cmdline[219]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:40:31.257091 kernel: Loading iSCSI transport class v2.0-870. May 17 00:40:31.274093 kernel: iscsi: registered transport (tcp) May 17 00:40:31.296153 kernel: iscsi: registered transport (qla4xxx) May 17 00:40:31.296212 kernel: QLogic iSCSI HBA Driver May 17 00:40:31.324522 systemd[1]: Finished dracut-cmdline.service. May 17 00:40:31.330190 kernel: audit: type=1130 audit(1747442431.325:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:31.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:31.326580 systemd[1]: Starting dracut-pre-udev.service... May 17 00:40:31.374098 kernel: raid6: avx2x4 gen() 28170 MB/s May 17 00:40:31.391077 kernel: raid6: avx2x4 xor() 7239 MB/s May 17 00:40:31.408087 kernel: raid6: avx2x2 gen() 30294 MB/s May 17 00:40:31.425083 kernel: raid6: avx2x2 xor() 17274 MB/s May 17 00:40:31.442098 kernel: raid6: avx2x1 gen() 25539 MB/s May 17 00:40:31.459078 kernel: raid6: avx2x1 xor() 15191 MB/s May 17 00:40:31.476098 kernel: raid6: sse2x4 gen() 14271 MB/s May 17 00:40:31.493073 kernel: raid6: sse2x4 xor() 6935 MB/s May 17 00:40:31.510079 kernel: raid6: sse2x2 gen() 13485 MB/s May 17 00:40:31.527078 kernel: raid6: sse2x2 xor() 9451 MB/s May 17 00:40:31.544117 kernel: raid6: sse2x1 gen() 12216 MB/s May 17 00:40:31.561510 kernel: raid6: sse2x1 xor() 7077 MB/s May 17 00:40:31.561569 kernel: raid6: using algorithm avx2x2 gen() 30294 MB/s May 17 00:40:31.561580 kernel: raid6: .... xor() 17274 MB/s, rmw enabled May 17 00:40:31.562234 kernel: raid6: using avx2x2 recovery algorithm May 17 00:40:31.575084 kernel: xor: automatically using best checksumming function avx May 17 00:40:31.671112 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 00:40:31.682347 systemd[1]: Finished dracut-pre-udev.service. May 17 00:40:31.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:31.687000 audit: BPF prog-id=7 op=LOAD May 17 00:40:31.687000 audit: BPF prog-id=8 op=LOAD May 17 00:40:31.688080 kernel: audit: type=1130 audit(1747442431.683:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:31.688182 systemd[1]: Starting systemd-udevd.service... May 17 00:40:31.701128 systemd-udevd[401]: Using default interface naming scheme 'v252'. May 17 00:40:31.705182 systemd[1]: Started systemd-udevd.service. May 17 00:40:31.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:31.708271 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:40:31.720111 dracut-pre-trigger[409]: rd.md=0: removing MD RAID activation May 17 00:40:31.747176 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:40:31.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:31.749806 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:40:31.789862 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:40:31.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:31.823689 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 17 00:40:31.843310 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 17 00:40:31.843328 kernel: GPT:9289727 != 19775487 May 17 00:40:31.843337 kernel: GPT:Alternate GPT header not at the end of the disk. May 17 00:40:31.843346 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:40:31.843356 kernel: GPT:9289727 != 19775487 May 17 00:40:31.843364 kernel: GPT: Use GNU Parted to correct GPT errors. May 17 00:40:31.843372 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:40:31.862104 kernel: AVX2 version of gcm_enc/dec engaged. May 17 00:40:31.864115 kernel: AES CTR mode by8 optimization enabled May 17 00:40:31.865082 kernel: libata version 3.00 loaded. May 17 00:40:31.876899 kernel: ahci 0000:00:1f.2: version 3.0 May 17 00:40:31.966491 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 17 00:40:31.966514 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 17 00:40:31.966624 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 17 00:40:31.966716 kernel: scsi host0: ahci May 17 00:40:31.966847 kernel: scsi host1: ahci May 17 00:40:31.966966 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (441) May 17 00:40:31.966984 kernel: scsi host2: ahci May 17 00:40:31.967131 kernel: scsi host3: ahci May 17 00:40:31.967232 kernel: scsi host4: ahci May 17 00:40:31.967329 kernel: scsi host5: ahci May 17 00:40:31.967443 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 May 17 00:40:31.967455 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 May 17 00:40:31.967466 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 May 17 00:40:31.967480 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 May 17 00:40:31.967490 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 May 17 00:40:31.967501 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 May 17 00:40:31.963781 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:40:31.986983 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:40:31.989181 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:40:31.993402 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:40:32.006188 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:40:32.008345 systemd[1]: Starting disk-uuid.service... May 17 00:40:32.161590 disk-uuid[525]: Primary Header is updated. May 17 00:40:32.161590 disk-uuid[525]: Secondary Entries is updated. May 17 00:40:32.161590 disk-uuid[525]: Secondary Header is updated. May 17 00:40:32.178421 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:40:32.183084 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:40:32.279078 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 17 00:40:32.279162 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 17 00:40:32.279172 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 17 00:40:32.280086 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 17 00:40:32.282079 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 17 00:40:32.283079 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 17 00:40:32.283103 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 17 00:40:32.284515 kernel: ata3.00: applying bridge limits May 17 00:40:32.285338 kernel: ata3.00: configured for UDMA/100 May 17 00:40:32.286090 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 17 00:40:32.320715 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 17 00:40:32.338012 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 17 00:40:32.338031 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 17 00:40:33.183091 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:40:33.183442 disk-uuid[527]: The operation has completed successfully. May 17 00:40:33.209237 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:40:33.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:33.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:33.209330 systemd[1]: Finished disk-uuid.service. May 17 00:40:33.213106 systemd[1]: Starting verity-setup.service... May 17 00:40:33.231083 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 17 00:40:33.252109 systemd[1]: Found device dev-mapper-usr.device. May 17 00:40:33.255202 systemd[1]: Mounting sysusr-usr.mount... May 17 00:40:33.257803 systemd[1]: Finished verity-setup.service. May 17 00:40:33.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:33.322991 systemd[1]: Mounted sysusr-usr.mount. May 17 00:40:33.324590 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:40:33.323426 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:40:33.324621 systemd[1]: Starting ignition-setup.service... May 17 00:40:33.328676 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:40:33.344601 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:40:33.344658 kernel: BTRFS info (device vda6): using free space tree May 17 00:40:33.344669 kernel: BTRFS info (device vda6): has skinny extents May 17 00:40:33.355085 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:40:33.364680 systemd[1]: Finished ignition-setup.service. May 17 00:40:33.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:33.366288 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:40:33.421864 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:40:33.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:33.424000 audit: BPF prog-id=9 op=LOAD May 17 00:40:33.424721 systemd[1]: Starting systemd-networkd.service... May 17 00:40:33.450513 systemd-networkd[717]: lo: Link UP May 17 00:40:33.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:33.450524 systemd-networkd[717]: lo: Gained carrier May 17 00:40:33.454570 systemd-networkd[717]: Enumeration completed May 17 00:40:33.454667 systemd[1]: Started systemd-networkd.service. May 17 00:40:33.455083 systemd-networkd[717]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:40:33.456024 systemd[1]: Reached target network.target. May 17 00:40:33.456292 systemd-networkd[717]: eth0: Link UP May 17 00:40:33.456296 systemd-networkd[717]: eth0: Gained carrier May 17 00:40:33.457777 systemd[1]: Starting iscsiuio.service... May 17 00:40:33.494508 ignition[656]: Ignition 2.14.0 May 17 00:40:33.495071 ignition[656]: Stage: fetch-offline May 17 00:40:33.495145 ignition[656]: no configs at "/usr/lib/ignition/base.d" May 17 00:40:33.495156 ignition[656]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 17 00:40:33.495286 ignition[656]: parsed url from cmdline: "" May 17 00:40:33.495289 ignition[656]: no config URL provided May 17 00:40:33.495294 ignition[656]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:40:33.495300 ignition[656]: no config at "/usr/lib/ignition/user.ign" May 17 00:40:33.495319 ignition[656]: op(1): [started] loading QEMU firmware config module May 17 00:40:33.495324 ignition[656]: op(1): executing: "modprobe" "qemu_fw_cfg" May 17 00:40:33.499116 ignition[656]: op(1): [finished] loading QEMU firmware config module May 17 00:40:33.502368 ignition[656]: parsing config with SHA512: bbc111a6e7186d05580ca8d41c1ed3e1ef2506108a4148a60378e1550132adb60a12d3fb3649865453eaf3615d8ceaf7ae2dfa2545bf495086eb9aa107fa8298 May 17 00:40:33.512930 unknown[656]: fetched base config from "system" May 17 00:40:33.513535 unknown[656]: fetched user config from "qemu" May 17 00:40:33.515006 ignition[656]: fetch-offline: fetch-offline passed May 17 00:40:33.515552 ignition[656]: Ignition finished successfully May 17 00:40:33.517208 systemd-networkd[717]: eth0: DHCPv4 address 10.0.0.142/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 17 00:40:33.517429 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:40:33.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:33.518066 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 17 00:40:33.519032 systemd[1]: Starting ignition-kargs.service... May 17 00:40:33.525356 systemd[1]: Started iscsiuio.service. May 17 00:40:33.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:33.526817 systemd[1]: Starting iscsid.service... May 17 00:40:33.529781 iscsid[725]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:40:33.529781 iscsid[725]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:40:33.529781 iscsid[725]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:40:33.529781 iscsid[725]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:40:33.529781 iscsid[725]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:40:33.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:33.542791 iscsid[725]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:40:33.530938 systemd[1]: Started iscsid.service. May 17 00:40:33.533095 systemd[1]: Starting dracut-initqueue.service... May 17 00:40:33.545149 ignition[723]: Ignition 2.14.0 May 17 00:40:33.545155 ignition[723]: Stage: kargs May 17 00:40:33.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:33.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:33.546678 systemd[1]: Finished dracut-initqueue.service. May 17 00:40:33.545254 ignition[723]: no configs at "/usr/lib/ignition/base.d" May 17 00:40:33.548388 systemd[1]: Finished ignition-kargs.service. May 17 00:40:33.545263 ignition[723]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 17 00:40:33.549698 systemd[1]: Reached target remote-fs-pre.target. May 17 00:40:33.546499 ignition[723]: kargs: kargs passed May 17 00:40:33.551343 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:40:33.546575 ignition[723]: Ignition finished successfully May 17 00:40:33.552274 systemd[1]: Reached target remote-fs.target. May 17 00:40:33.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:33.553836 systemd[1]: Starting dracut-pre-mount.service... May 17 00:40:33.555537 systemd[1]: Starting ignition-disks.service... May 17 00:40:33.562478 systemd[1]: Finished dracut-pre-mount.service. May 17 00:40:33.569587 ignition[741]: Ignition 2.14.0 May 17 00:40:33.569597 ignition[741]: Stage: disks May 17 00:40:33.569719 ignition[741]: no configs at "/usr/lib/ignition/base.d" May 17 00:40:33.569728 ignition[741]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 17 00:40:33.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:33.571605 systemd[1]: Finished ignition-disks.service. May 17 00:40:33.570807 ignition[741]: disks: disks passed May 17 00:40:33.573037 systemd[1]: Reached target initrd-root-device.target. May 17 00:40:33.570859 ignition[741]: Ignition finished successfully May 17 00:40:33.574901 systemd[1]: Reached target local-fs-pre.target. May 17 00:40:33.575809 systemd[1]: Reached target local-fs.target. May 17 00:40:33.577408 systemd[1]: Reached target sysinit.target. May 17 00:40:33.577814 systemd[1]: Reached target basic.target. May 17 00:40:33.579661 systemd[1]: Starting systemd-fsck-root.service... May 17 00:40:33.618026 systemd-fsck[753]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 17 00:40:33.889248 systemd[1]: Finished systemd-fsck-root.service. May 17 00:40:33.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:33.903569 systemd[1]: Mounting sysroot.mount... May 17 00:40:33.923078 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:40:33.923324 systemd[1]: Mounted sysroot.mount. May 17 00:40:33.924139 systemd[1]: Reached target initrd-root-fs.target. May 17 00:40:33.926487 systemd[1]: Mounting sysroot-usr.mount... May 17 00:40:33.927597 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 17 00:40:33.927629 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:40:33.927651 systemd[1]: Reached target ignition-diskful.target. May 17 00:40:33.929737 systemd[1]: Mounted sysroot-usr.mount. May 17 00:40:33.931783 systemd[1]: Starting initrd-setup-root.service... May 17 00:40:33.937417 initrd-setup-root[763]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:40:33.941215 initrd-setup-root[771]: cut: /sysroot/etc/group: No such file or directory May 17 00:40:33.945460 initrd-setup-root[779]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:40:33.949823 initrd-setup-root[787]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:40:33.985949 systemd[1]: Finished initrd-setup-root.service. May 17 00:40:33.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:33.988781 systemd[1]: Starting ignition-mount.service... May 17 00:40:33.991131 systemd[1]: Starting sysroot-boot.service... May 17 00:40:33.996252 bash[804]: umount: /sysroot/usr/share/oem: not mounted. May 17 00:40:34.005192 ignition[805]: INFO : Ignition 2.14.0 May 17 00:40:34.006289 ignition[805]: INFO : Stage: mount May 17 00:40:34.006289 ignition[805]: INFO : no configs at "/usr/lib/ignition/base.d" May 17 00:40:34.006289 ignition[805]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 17 00:40:34.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:34.010651 ignition[805]: INFO : mount: mount passed May 17 00:40:34.010651 ignition[805]: INFO : Ignition finished successfully May 17 00:40:34.007733 systemd[1]: Finished ignition-mount.service. May 17 00:40:34.014115 systemd[1]: Finished sysroot-boot.service. May 17 00:40:34.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:34.265556 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:40:34.276689 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (814) May 17 00:40:34.276717 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:40:34.276727 kernel: BTRFS info (device vda6): using free space tree May 17 00:40:34.277589 kernel: BTRFS info (device vda6): has skinny extents May 17 00:40:34.281946 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:40:34.283656 systemd[1]: Starting ignition-files.service... May 17 00:40:34.303147 ignition[834]: INFO : Ignition 2.14.0 May 17 00:40:34.303147 ignition[834]: INFO : Stage: files May 17 00:40:34.305082 ignition[834]: INFO : no configs at "/usr/lib/ignition/base.d" May 17 00:40:34.305082 ignition[834]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 17 00:40:34.305082 ignition[834]: DEBUG : files: compiled without relabeling support, skipping May 17 00:40:34.309268 ignition[834]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:40:34.309268 ignition[834]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:40:34.313460 ignition[834]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:40:34.315026 ignition[834]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:40:34.316753 unknown[834]: wrote ssh authorized keys file for user: core May 17 00:40:34.318097 ignition[834]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:40:34.319796 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 17 00:40:34.319796 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:40:34.319796 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:40:34.319796 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:40:34.319796 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:40:34.319796 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:40:34.319796 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:40:34.319796 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 May 17 00:40:34.883777 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK May 17 00:40:35.218964 systemd-networkd[717]: eth0: Gained IPv6LL May 17 00:40:35.557286 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:40:35.557286 ignition[834]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" May 17 00:40:35.561036 ignition[834]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 17 00:40:35.563027 ignition[834]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 17 00:40:35.563027 ignition[834]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" May 17 00:40:35.566252 ignition[834]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" May 17 00:40:35.566252 ignition[834]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" May 17 00:40:35.597552 ignition[834]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 17 00:40:35.600420 ignition[834]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" May 17 00:40:35.600420 ignition[834]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:40:35.600420 ignition[834]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:40:35.600420 ignition[834]: INFO : files: files passed May 17 00:40:35.600420 ignition[834]: INFO : Ignition finished successfully May 17 00:40:35.627563 kernel: kauditd_printk_skb: 23 callbacks suppressed May 17 00:40:35.627590 kernel: audit: type=1130 audit(1747442435.600:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.627602 kernel: audit: type=1130 audit(1747442435.614:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.627612 kernel: audit: type=1130 audit(1747442435.619:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.627622 kernel: audit: type=1131 audit(1747442435.619:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.599327 systemd[1]: Finished ignition-files.service. May 17 00:40:35.601550 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:40:35.607739 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:40:35.632606 initrd-setup-root-after-ignition[857]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 17 00:40:35.608807 systemd[1]: Starting ignition-quench.service... May 17 00:40:35.635208 initrd-setup-root-after-ignition[859]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:40:35.611300 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:40:35.614416 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:40:35.614513 systemd[1]: Finished ignition-quench.service. May 17 00:40:35.619798 systemd[1]: Reached target ignition-complete.target. May 17 00:40:35.628794 systemd[1]: Starting initrd-parse-etc.service... May 17 00:40:35.645287 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:40:35.645418 systemd[1]: Finished initrd-parse-etc.service. May 17 00:40:35.654919 kernel: audit: type=1130 audit(1747442435.647:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.654939 kernel: audit: type=1131 audit(1747442435.647:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.647284 systemd[1]: Reached target initrd-fs.target. May 17 00:40:35.654992 systemd[1]: Reached target initrd.target. May 17 00:40:35.655839 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:40:35.656651 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:40:35.669807 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:40:35.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.672738 systemd[1]: Starting initrd-cleanup.service... May 17 00:40:35.676459 kernel: audit: type=1130 audit(1747442435.671:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.684207 systemd[1]: Stopped target nss-lookup.target. May 17 00:40:35.686200 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:40:35.687321 systemd[1]: Stopped target timers.target. May 17 00:40:35.689205 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:40:35.695590 kernel: audit: type=1131 audit(1747442435.690:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.689368 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:40:35.690994 systemd[1]: Stopped target initrd.target. May 17 00:40:35.695736 systemd[1]: Stopped target basic.target. May 17 00:40:35.697387 systemd[1]: Stopped target ignition-complete.target. May 17 00:40:35.698905 systemd[1]: Stopped target ignition-diskful.target. May 17 00:40:35.700431 systemd[1]: Stopped target initrd-root-device.target. May 17 00:40:35.702161 systemd[1]: Stopped target remote-fs.target. May 17 00:40:35.703750 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:40:35.705453 systemd[1]: Stopped target sysinit.target. May 17 00:40:35.707020 systemd[1]: Stopped target local-fs.target. May 17 00:40:35.708604 systemd[1]: Stopped target local-fs-pre.target. May 17 00:40:35.710234 systemd[1]: Stopped target swap.target. May 17 00:40:35.717911 kernel: audit: type=1131 audit(1747442435.713:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.711694 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:40:35.711820 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:40:35.724421 kernel: audit: type=1131 audit(1747442435.719:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.713386 systemd[1]: Stopped target cryptsetup.target. May 17 00:40:35.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.717977 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:40:35.718109 systemd[1]: Stopped dracut-initqueue.service. May 17 00:40:35.719892 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:40:35.720000 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:40:35.724557 systemd[1]: Stopped target paths.target. May 17 00:40:35.726182 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:40:35.730126 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:40:35.731899 systemd[1]: Stopped target slices.target. May 17 00:40:35.733821 systemd[1]: Stopped target sockets.target. May 17 00:40:35.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.735603 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:40:35.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.735753 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:40:35.742968 iscsid[725]: iscsid shutting down. May 17 00:40:35.737515 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:40:35.737647 systemd[1]: Stopped ignition-files.service. May 17 00:40:35.740256 systemd[1]: Stopping ignition-mount.service... May 17 00:40:35.741289 systemd[1]: Stopping iscsid.service... May 17 00:40:35.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.754435 ignition[874]: INFO : Ignition 2.14.0 May 17 00:40:35.754435 ignition[874]: INFO : Stage: umount May 17 00:40:35.754435 ignition[874]: INFO : no configs at "/usr/lib/ignition/base.d" May 17 00:40:35.754435 ignition[874]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 17 00:40:35.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.743828 systemd[1]: Stopping sysroot-boot.service... May 17 00:40:35.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.762483 ignition[874]: INFO : umount: umount passed May 17 00:40:35.762483 ignition[874]: INFO : Ignition finished successfully May 17 00:40:35.746474 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:40:35.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.746676 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:40:35.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.749766 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:40:35.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.749892 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:40:35.755989 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:40:35.756129 systemd[1]: Stopped iscsid.service. May 17 00:40:35.757097 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:40:35.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.757177 systemd[1]: Stopped ignition-mount.service. May 17 00:40:35.760378 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:40:35.760451 systemd[1]: Finished initrd-cleanup.service. May 17 00:40:35.762070 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:40:35.762100 systemd[1]: Closed iscsid.socket. May 17 00:40:35.762766 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:40:35.762801 systemd[1]: Stopped ignition-disks.service. May 17 00:40:35.765363 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:40:35.765395 systemd[1]: Stopped ignition-kargs.service. May 17 00:40:35.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.767234 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:40:35.767267 systemd[1]: Stopped ignition-setup.service. May 17 00:40:35.769767 systemd[1]: Stopping iscsiuio.service... May 17 00:40:35.772709 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:40:35.772783 systemd[1]: Stopped iscsiuio.service. May 17 00:40:35.773690 systemd[1]: Stopped target network.target. May 17 00:40:35.775420 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:40:35.775451 systemd[1]: Closed iscsiuio.socket. May 17 00:40:35.777287 systemd[1]: Stopping systemd-networkd.service... May 17 00:40:35.777848 systemd[1]: Stopping systemd-resolved.service... May 17 00:40:35.784405 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:40:35.784482 systemd[1]: Stopped systemd-resolved.service. May 17 00:40:35.786338 systemd-networkd[717]: eth0: DHCPv6 lease lost May 17 00:40:35.792929 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:40:35.795384 systemd[1]: Stopped systemd-networkd.service. May 17 00:40:35.797000 audit: BPF prog-id=6 op=UNLOAD May 17 00:40:35.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.801906 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:40:35.803000 audit: BPF prog-id=9 op=UNLOAD May 17 00:40:35.803243 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:40:35.803273 systemd[1]: Closed systemd-networkd.socket. May 17 00:40:35.811422 systemd[1]: Stopping network-cleanup.service... May 17 00:40:35.813254 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:40:35.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.813305 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:40:35.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.815546 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:40:35.815585 systemd[1]: Stopped systemd-sysctl.service. May 17 00:40:35.817623 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:40:35.817660 systemd[1]: Stopped systemd-modules-load.service. May 17 00:40:35.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.822453 systemd[1]: Stopping systemd-udevd.service... May 17 00:40:35.825692 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:40:35.829399 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:40:35.829535 systemd[1]: Stopped network-cleanup.service. May 17 00:40:35.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.833358 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:40:35.833514 systemd[1]: Stopped systemd-udevd.service. May 17 00:40:35.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.836847 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:40:35.836909 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:40:35.838913 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:40:35.838945 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:40:35.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.840836 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:40:35.840908 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:40:35.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.844017 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:40:35.844079 systemd[1]: Stopped dracut-cmdline.service. May 17 00:40:35.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.846379 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:40:35.847240 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:40:35.852940 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:40:35.855007 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 17 00:40:35.855089 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 17 00:40:35.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.858693 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:40:35.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.858753 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:40:35.860864 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:40:35.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.860922 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:40:35.866031 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 17 00:40:35.867926 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:40:35.868908 systemd[1]: Stopped sysroot-boot.service. May 17 00:40:35.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.870585 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:40:35.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.870663 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:40:35.872777 systemd[1]: Reached target initrd-switch-root.target. May 17 00:40:35.875366 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:40:35.875407 systemd[1]: Stopped initrd-setup-root.service. May 17 00:40:35.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:35.878649 systemd[1]: Starting initrd-switch-root.service... May 17 00:40:35.894928 systemd[1]: Switching root. May 17 00:40:35.916370 systemd-journald[197]: Journal stopped May 17 00:40:40.301341 systemd-journald[197]: Received SIGTERM from PID 1 (n/a). May 17 00:40:40.301404 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:40:40.301427 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:40:40.301442 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:40:40.301455 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:40:40.301471 kernel: SELinux: policy capability open_perms=1 May 17 00:40:40.301483 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:40:40.301496 kernel: SELinux: policy capability always_check_network=0 May 17 00:40:40.301512 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:40:40.301525 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:40:40.301537 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:40:40.301551 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:40:40.301569 systemd[1]: Successfully loaded SELinux policy in 44.553ms. May 17 00:40:40.301590 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.776ms. May 17 00:40:40.301606 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:40:40.301620 systemd[1]: Detected virtualization kvm. May 17 00:40:40.301635 systemd[1]: Detected architecture x86-64. May 17 00:40:40.301650 systemd[1]: Detected first boot. May 17 00:40:40.301668 systemd[1]: Initializing machine ID from VM UUID. May 17 00:40:40.301683 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:40:40.301698 systemd[1]: Populated /etc with preset unit settings. May 17 00:40:40.301717 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:40:40.301734 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:40:40.301763 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:40:40.301778 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:40:40.301794 systemd[1]: Stopped initrd-switch-root.service. May 17 00:40:40.301811 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:40:40.301826 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:40:40.301842 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:40:40.301858 systemd[1]: Created slice system-getty.slice. May 17 00:40:40.301874 systemd[1]: Created slice system-modprobe.slice. May 17 00:40:40.301889 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:40:40.301905 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:40:40.301920 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:40:40.301935 systemd[1]: Created slice user.slice. May 17 00:40:40.301952 systemd[1]: Started systemd-ask-password-console.path. May 17 00:40:40.301967 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:40:40.301982 systemd[1]: Set up automount boot.automount. May 17 00:40:40.302000 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:40:40.302020 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:40:40.302037 systemd[1]: Stopped target initrd-fs.target. May 17 00:40:40.302074 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:40:40.302093 systemd[1]: Reached target integritysetup.target. May 17 00:40:40.302108 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:40:40.302122 systemd[1]: Reached target remote-fs.target. May 17 00:40:40.302138 systemd[1]: Reached target slices.target. May 17 00:40:40.302152 systemd[1]: Reached target swap.target. May 17 00:40:40.302167 systemd[1]: Reached target torcx.target. May 17 00:40:40.302183 systemd[1]: Reached target veritysetup.target. May 17 00:40:40.302201 systemd[1]: Listening on systemd-coredump.socket. May 17 00:40:40.302220 systemd[1]: Listening on systemd-initctl.socket. May 17 00:40:40.302236 systemd[1]: Listening on systemd-networkd.socket. May 17 00:40:40.302252 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:40:40.302268 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:40:40.302283 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:40:40.302298 systemd[1]: Mounting dev-hugepages.mount... May 17 00:40:40.302313 systemd[1]: Mounting dev-mqueue.mount... May 17 00:40:40.302328 systemd[1]: Mounting media.mount... May 17 00:40:40.302345 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:40:40.302360 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:40:40.302375 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:40:40.302389 systemd[1]: Mounting tmp.mount... May 17 00:40:40.302404 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:40:40.302418 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:40:40.302432 systemd[1]: Starting kmod-static-nodes.service... May 17 00:40:40.302446 systemd[1]: Starting modprobe@configfs.service... May 17 00:40:40.302460 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:40:40.302476 systemd[1]: Starting modprobe@drm.service... May 17 00:40:40.302490 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:40:40.302504 systemd[1]: Starting modprobe@fuse.service... May 17 00:40:40.302518 systemd[1]: Starting modprobe@loop.service... May 17 00:40:40.302532 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:40:40.302546 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:40:40.302560 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:40:40.302575 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:40:40.302590 kernel: loop: module loaded May 17 00:40:40.302607 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:40:40.302622 systemd[1]: Stopped systemd-journald.service. May 17 00:40:40.302636 kernel: fuse: init (API version 7.34) May 17 00:40:40.302650 systemd[1]: Starting systemd-journald.service... May 17 00:40:40.302664 systemd[1]: Starting systemd-modules-load.service... May 17 00:40:40.302678 systemd[1]: Starting systemd-network-generator.service... May 17 00:40:40.302692 systemd[1]: Starting systemd-remount-fs.service... May 17 00:40:40.302706 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:40:40.302720 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:40:40.302736 systemd[1]: Stopped verity-setup.service. May 17 00:40:40.305838 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:40:40.305865 systemd[1]: Mounted dev-hugepages.mount. May 17 00:40:40.305880 systemd[1]: Mounted dev-mqueue.mount. May 17 00:40:40.305894 systemd[1]: Mounted media.mount. May 17 00:40:40.305910 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:40:40.305924 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:40:40.305939 systemd[1]: Mounted tmp.mount. May 17 00:40:40.305953 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:40:40.305977 systemd-journald[988]: Journal started May 17 00:40:40.306043 systemd-journald[988]: Runtime Journal (/run/log/journal/4aa8ed7108c0420f8fbca6f1ad967a64) is 6.0M, max 48.5M, 42.5M free. May 17 00:40:35.985000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:40:36.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:40:36.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:40:36.584000 audit: BPF prog-id=10 op=LOAD May 17 00:40:36.584000 audit: BPF prog-id=10 op=UNLOAD May 17 00:40:36.584000 audit: BPF prog-id=11 op=LOAD May 17 00:40:36.584000 audit: BPF prog-id=11 op=UNLOAD May 17 00:40:36.620000 audit[907]: AVC avc: denied { associate } for pid=907 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:40:36.620000 audit[907]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001878d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=890 pid=907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:36.620000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:40:36.621000 audit[907]: AVC avc: denied { associate } for pid=907 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:40:36.621000 audit[907]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001879a9 a2=1ed a3=0 items=2 ppid=890 pid=907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:36.621000 audit: CWD cwd="/" May 17 00:40:36.621000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:36.621000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:36.621000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:40:40.103000 audit: BPF prog-id=12 op=LOAD May 17 00:40:40.103000 audit: BPF prog-id=3 op=UNLOAD May 17 00:40:40.103000 audit: BPF prog-id=13 op=LOAD May 17 00:40:40.103000 audit: BPF prog-id=14 op=LOAD May 17 00:40:40.103000 audit: BPF prog-id=4 op=UNLOAD May 17 00:40:40.103000 audit: BPF prog-id=5 op=UNLOAD May 17 00:40:40.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.117000 audit: BPF prog-id=12 op=UNLOAD May 17 00:40:40.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.227000 audit: BPF prog-id=15 op=LOAD May 17 00:40:40.229000 audit: BPF prog-id=16 op=LOAD May 17 00:40:40.229000 audit: BPF prog-id=17 op=LOAD May 17 00:40:40.229000 audit: BPF prog-id=13 op=UNLOAD May 17 00:40:40.229000 audit: BPF prog-id=14 op=UNLOAD May 17 00:40:40.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.299000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:40:40.299000 audit[988]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fff01d281e0 a2=4000 a3=7fff01d2827c items=0 ppid=1 pid=988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:40.299000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:40:40.101655 systemd[1]: Queued start job for default target multi-user.target. May 17 00:40:36.618517 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-17T00:40:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:40:40.101665 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 17 00:40:36.618786 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-17T00:40:36Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:40:40.104680 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:40:36.618803 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-17T00:40:36Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:40:36.618833 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-17T00:40:36Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:40:36.618842 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-17T00:40:36Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:40:36.618881 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-17T00:40:36Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:40:36.618894 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-17T00:40:36Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:40:36.619143 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-17T00:40:36Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:40:36.619178 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-17T00:40:36Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:40:36.619190 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-17T00:40:36Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:40:36.619835 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-17T00:40:36Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:40:40.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:36.619880 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-17T00:40:36Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:40:36.619896 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-17T00:40:36Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:40:36.619910 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-17T00:40:36Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:40:36.619925 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-17T00:40:36Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:40:36.619939 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-17T00:40:36Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:40:39.803940 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-17T00:40:39Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:40:40.310239 systemd[1]: Started systemd-journald.service. May 17 00:40:39.804376 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-17T00:40:39Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:40:39.804576 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-17T00:40:39Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:40:39.804943 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-17T00:40:39Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:40:39.805022 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-17T00:40:39Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:40:39.805155 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-17T00:40:39Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:40:40.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.328169 systemd[1]: Finished kmod-static-nodes.service. May 17 00:40:40.341621 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:40:40.341835 systemd[1]: Finished modprobe@configfs.service. May 17 00:40:40.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.352081 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:40:40.352261 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:40:40.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.370431 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:40:40.370616 systemd[1]: Finished modprobe@drm.service. May 17 00:40:40.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.383602 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:40:40.383802 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:40:40.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.388539 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:40:40.388710 systemd[1]: Finished modprobe@fuse.service. May 17 00:40:40.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.400118 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:40:40.400290 systemd[1]: Finished modprobe@loop.service. May 17 00:40:40.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.402643 systemd[1]: Finished systemd-modules-load.service. May 17 00:40:40.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.409454 systemd[1]: Finished systemd-network-generator.service. May 17 00:40:40.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.426481 systemd[1]: Finished systemd-remount-fs.service. May 17 00:40:40.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.444326 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:40:40.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.448277 systemd[1]: Reached target network-pre.target. May 17 00:40:40.455493 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:40:40.464951 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:40:40.466454 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:40:40.478467 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:40:40.481915 systemd[1]: Starting systemd-journal-flush.service... May 17 00:40:40.489215 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:40:40.496157 systemd[1]: Starting systemd-random-seed.service... May 17 00:40:40.498958 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:40:40.904491 systemd[1]: Starting systemd-sysctl.service... May 17 00:40:40.907410 systemd[1]: Starting systemd-sysusers.service... May 17 00:40:40.911623 systemd[1]: Starting systemd-udev-settle.service... May 17 00:40:40.919436 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:40:40.924348 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:40:40.933212 systemd-journald[988]: Time spent on flushing to /var/log/journal/4aa8ed7108c0420f8fbca6f1ad967a64 is 38.933ms for 1083 entries. May 17 00:40:40.933212 systemd-journald[988]: System Journal (/var/log/journal/4aa8ed7108c0420f8fbca6f1ad967a64) is 8.0M, max 195.6M, 187.6M free. May 17 00:40:41.044859 systemd-journald[988]: Received client request to flush runtime journal. May 17 00:40:41.044920 kernel: kauditd_printk_skb: 90 callbacks suppressed May 17 00:40:41.044945 kernel: audit: type=1130 audit(1747442440.980:125): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:41.044973 kernel: audit: type=1130 audit(1747442441.030:126): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:41.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.978330 systemd[1]: Finished systemd-random-seed.service. May 17 00:40:41.045238 udevadm[1010]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 17 00:40:40.980396 systemd[1]: Reached target first-boot-complete.target. May 17 00:40:41.023982 systemd[1]: Finished systemd-sysctl.service. May 17 00:40:41.046542 systemd[1]: Finished systemd-journal-flush.service. May 17 00:40:41.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:41.055755 systemd[1]: Finished systemd-sysusers.service. May 17 00:40:41.056896 kernel: audit: type=1130 audit(1747442441.051:127): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:41.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:41.059436 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:40:41.067100 kernel: audit: type=1130 audit(1747442441.057:128): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:41.130801 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:40:41.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:41.141801 kernel: audit: type=1130 audit(1747442441.132:129): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:43.321497 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:40:43.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:43.362758 kernel: audit: type=1130 audit(1747442443.327:130): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:43.362970 kernel: audit: type=1334 audit(1747442443.337:131): prog-id=18 op=LOAD May 17 00:40:43.337000 audit: BPF prog-id=18 op=LOAD May 17 00:40:43.364000 audit: BPF prog-id=19 op=LOAD May 17 00:40:43.366983 kernel: audit: type=1334 audit(1747442443.364:132): prog-id=19 op=LOAD May 17 00:40:43.367040 kernel: audit: type=1334 audit(1747442443.364:133): prog-id=7 op=UNLOAD May 17 00:40:43.364000 audit: BPF prog-id=7 op=UNLOAD May 17 00:40:43.369574 kernel: audit: type=1334 audit(1747442443.364:134): prog-id=8 op=UNLOAD May 17 00:40:43.364000 audit: BPF prog-id=8 op=UNLOAD May 17 00:40:43.398192 systemd[1]: Starting systemd-udevd.service... May 17 00:40:43.452282 systemd-udevd[1015]: Using default interface naming scheme 'v252'. May 17 00:40:43.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:43.499830 systemd[1]: Started systemd-udevd.service. May 17 00:40:43.528000 audit: BPF prog-id=20 op=LOAD May 17 00:40:43.537923 systemd[1]: Starting systemd-networkd.service... May 17 00:40:43.562356 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 17 00:40:43.581000 audit: BPF prog-id=21 op=LOAD May 17 00:40:43.596000 audit: BPF prog-id=22 op=LOAD May 17 00:40:43.612000 audit: BPF prog-id=23 op=LOAD May 17 00:40:43.629932 systemd[1]: Starting systemd-userdbd.service... May 17 00:40:43.676125 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:40:43.772000 audit[1022]: AVC avc: denied { confidentiality } for pid=1022 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:40:43.867086 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 17 00:40:43.772000 audit[1022]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55679d2ac710 a1=338ac a2=7f4e42db7bc5 a3=5 items=110 ppid=1015 pid=1022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:43.772000 audit: CWD cwd="/" May 17 00:40:43.772000 audit: PATH item=0 name=(null) inode=44 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=1 name=(null) inode=1910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=2 name=(null) inode=1910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=3 name=(null) inode=1911 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=4 name=(null) inode=1910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=5 name=(null) inode=1912 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=6 name=(null) inode=1910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=7 name=(null) inode=1913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=8 name=(null) inode=1913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=9 name=(null) inode=1914 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=10 name=(null) inode=1913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=11 name=(null) inode=1915 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=12 name=(null) inode=1913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=13 name=(null) inode=1916 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=14 name=(null) inode=1913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=15 name=(null) inode=1917 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=16 name=(null) inode=1913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=17 name=(null) inode=1918 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=18 name=(null) inode=1910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=19 name=(null) inode=1919 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=20 name=(null) inode=1919 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=21 name=(null) inode=1920 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=22 name=(null) inode=1919 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=23 name=(null) inode=1921 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=24 name=(null) inode=1919 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=25 name=(null) inode=1922 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=26 name=(null) inode=1919 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=27 name=(null) inode=1923 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=28 name=(null) inode=1919 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=29 name=(null) inode=1924 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=30 name=(null) inode=1910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=31 name=(null) inode=1925 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=32 name=(null) inode=1925 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=33 name=(null) inode=1926 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=34 name=(null) inode=1925 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=35 name=(null) inode=1927 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=36 name=(null) inode=1925 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=37 name=(null) inode=1928 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=38 name=(null) inode=1925 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=39 name=(null) inode=1929 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=40 name=(null) inode=1925 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=41 name=(null) inode=1930 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=42 name=(null) inode=1910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=43 name=(null) inode=1931 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=44 name=(null) inode=1931 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=45 name=(null) inode=1932 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=46 name=(null) inode=1931 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=47 name=(null) inode=1933 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=48 name=(null) inode=1931 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=49 name=(null) inode=1934 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=50 name=(null) inode=1931 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=51 name=(null) inode=1935 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=52 name=(null) inode=1931 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=53 name=(null) inode=1936 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=54 name=(null) inode=44 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=55 name=(null) inode=1937 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=56 name=(null) inode=1937 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=57 name=(null) inode=1938 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=58 name=(null) inode=1937 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=59 name=(null) inode=1939 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=60 name=(null) inode=1937 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=61 name=(null) inode=1940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=62 name=(null) inode=1940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=63 name=(null) inode=1941 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=64 name=(null) inode=1940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=65 name=(null) inode=1942 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=66 name=(null) inode=1940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.877802 kernel: ACPI: button: Power Button [PWRF] May 17 00:40:43.772000 audit: PATH item=67 name=(null) inode=1943 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=68 name=(null) inode=1940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=69 name=(null) inode=1944 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=70 name=(null) inode=1940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=71 name=(null) inode=1945 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=72 name=(null) inode=1937 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=73 name=(null) inode=1946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=74 name=(null) inode=1946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=75 name=(null) inode=1947 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=76 name=(null) inode=1946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=77 name=(null) inode=1948 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=78 name=(null) inode=1946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=79 name=(null) inode=1949 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=80 name=(null) inode=1946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=81 name=(null) inode=1950 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=82 name=(null) inode=1946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=83 name=(null) inode=1951 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=84 name=(null) inode=1937 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=85 name=(null) inode=1952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=86 name=(null) inode=1952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=87 name=(null) inode=1953 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=88 name=(null) inode=1952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=89 name=(null) inode=1954 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=90 name=(null) inode=1952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=91 name=(null) inode=1955 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=92 name=(null) inode=1952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=93 name=(null) inode=1956 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=94 name=(null) inode=1952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=95 name=(null) inode=1957 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=96 name=(null) inode=1937 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=97 name=(null) inode=1958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=98 name=(null) inode=1958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=99 name=(null) inode=1959 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=100 name=(null) inode=1958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=101 name=(null) inode=1960 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=102 name=(null) inode=1958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=103 name=(null) inode=1961 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=104 name=(null) inode=1958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=105 name=(null) inode=1962 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=106 name=(null) inode=1958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=107 name=(null) inode=1963 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PATH item=109 name=(null) inode=1964 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:40:43.772000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:40:43.896287 systemd[1]: Started systemd-userdbd.service. May 17 00:40:43.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:43.960087 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 17 00:40:43.967389 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 17 00:40:43.967584 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 17 00:40:43.977195 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 17 00:40:44.067197 systemd-networkd[1024]: lo: Link UP May 17 00:40:44.067216 systemd-networkd[1024]: lo: Gained carrier May 17 00:40:44.069048 systemd-networkd[1024]: Enumeration completed May 17 00:40:44.069544 systemd[1]: Started systemd-networkd.service. May 17 00:40:44.069560 systemd-networkd[1024]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:40:44.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:44.114030 systemd-networkd[1024]: eth0: Link UP May 17 00:40:44.117901 systemd-networkd[1024]: eth0: Gained carrier May 17 00:40:44.191106 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:40:44.205530 systemd-networkd[1024]: eth0: DHCPv4 address 10.0.0.142/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 17 00:40:44.240682 kernel: kvm: Nested Virtualization enabled May 17 00:40:44.240837 kernel: SVM: kvm: Nested Paging enabled May 17 00:40:44.240866 kernel: SVM: Virtual VMLOAD VMSAVE supported May 17 00:40:44.240888 kernel: SVM: Virtual GIF supported May 17 00:40:44.403100 kernel: EDAC MC: Ver: 3.0.0 May 17 00:40:44.466745 systemd[1]: Finished systemd-udev-settle.service. May 17 00:40:44.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:44.470860 systemd[1]: Starting lvm2-activation-early.service... May 17 00:40:44.814265 lvm[1051]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:40:44.859521 systemd[1]: Finished lvm2-activation-early.service. May 17 00:40:44.870098 systemd[1]: Reached target cryptsetup.target. May 17 00:40:44.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:44.882770 systemd[1]: Starting lvm2-activation.service... May 17 00:40:44.890976 lvm[1052]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:40:44.933761 systemd[1]: Finished lvm2-activation.service. May 17 00:40:44.936898 systemd[1]: Reached target local-fs-pre.target. May 17 00:40:44.941917 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:40:44.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:44.942732 systemd[1]: Reached target local-fs.target. May 17 00:40:44.943957 systemd[1]: Reached target machines.target. May 17 00:40:44.956261 systemd[1]: Starting ldconfig.service... May 17 00:40:44.962779 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:40:44.962901 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:40:44.965232 systemd[1]: Starting systemd-boot-update.service... May 17 00:40:44.969040 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:40:44.979911 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:40:44.986509 systemd[1]: Starting systemd-sysext.service... May 17 00:40:44.990401 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1054 (bootctl) May 17 00:40:44.997026 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:40:45.036288 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:40:45.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:45.065694 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:40:45.093233 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:40:45.093434 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:40:45.147843 kernel: loop0: detected capacity change from 0 to 224512 May 17 00:40:45.205160 systemd-fsck[1061]: fsck.fat 4.2 (2021-01-31) May 17 00:40:45.205160 systemd-fsck[1061]: /dev/vda1: 790 files, 120726/258078 clusters May 17 00:40:45.215227 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:40:45.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:45.232408 systemd[1]: Mounting boot.mount... May 17 00:40:45.526716 systemd[1]: Mounted boot.mount. May 17 00:40:45.565914 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:40:45.595403 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:40:45.597223 systemd[1]: Finished systemd-boot-update.service. May 17 00:40:45.603946 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:40:45.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:45.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:45.650277 systemd-networkd[1024]: eth0: Gained IPv6LL May 17 00:40:45.679154 kernel: loop1: detected capacity change from 0 to 224512 May 17 00:40:45.736540 (sd-sysext)[1067]: Using extensions 'kubernetes'. May 17 00:40:45.739464 (sd-sysext)[1067]: Merged extensions into '/usr'. May 17 00:40:45.810418 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:40:45.812665 systemd[1]: Mounting usr-share-oem.mount... May 17 00:40:45.821424 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:40:45.830477 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:40:45.864953 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:40:45.887045 systemd[1]: Starting modprobe@loop.service... May 17 00:40:45.890339 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:40:45.890692 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:40:45.890864 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:40:45.898273 systemd[1]: Mounted usr-share-oem.mount. May 17 00:40:45.910923 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:40:45.913323 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:40:45.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:45.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:45.920902 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:40:45.921134 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:40:45.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:45.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:45.927677 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:40:45.927870 systemd[1]: Finished modprobe@loop.service. May 17 00:40:45.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:45.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:45.935805 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:40:45.936021 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:40:45.938201 systemd[1]: Finished systemd-sysext.service. May 17 00:40:45.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:45.941635 systemd[1]: Starting ensure-sysext.service... May 17 00:40:45.957421 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:40:45.971939 systemd[1]: Reloading. May 17 00:40:45.991946 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:40:45.997212 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:40:46.007474 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:40:46.083394 /usr/lib/systemd/system-generators/torcx-generator[1093]: time="2025-05-17T00:40:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:40:46.083422 /usr/lib/systemd/system-generators/torcx-generator[1093]: time="2025-05-17T00:40:46Z" level=info msg="torcx already run" May 17 00:40:46.274479 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:40:46.274509 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:40:46.330996 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:40:46.396108 ldconfig[1053]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:40:46.466711 kernel: kauditd_printk_skb: 135 callbacks suppressed May 17 00:40:46.466889 kernel: audit: type=1334 audit(1747442446.462:157): prog-id=24 op=LOAD May 17 00:40:46.462000 audit: BPF prog-id=24 op=LOAD May 17 00:40:46.467000 audit: BPF prog-id=15 op=UNLOAD May 17 00:40:46.481806 kernel: audit: type=1334 audit(1747442446.467:158): prog-id=15 op=UNLOAD May 17 00:40:46.482000 audit: BPF prog-id=25 op=LOAD May 17 00:40:46.486873 kernel: audit: type=1334 audit(1747442446.482:159): prog-id=25 op=LOAD May 17 00:40:46.486000 audit: BPF prog-id=26 op=LOAD May 17 00:40:46.487000 audit: BPF prog-id=16 op=UNLOAD May 17 00:40:46.514445 kernel: audit: type=1334 audit(1747442446.486:160): prog-id=26 op=LOAD May 17 00:40:46.514649 kernel: audit: type=1334 audit(1747442446.487:161): prog-id=16 op=UNLOAD May 17 00:40:46.514815 kernel: audit: type=1334 audit(1747442446.492:162): prog-id=17 op=UNLOAD May 17 00:40:46.492000 audit: BPF prog-id=17 op=UNLOAD May 17 00:40:46.514000 audit: BPF prog-id=27 op=LOAD May 17 00:40:46.518000 audit: BPF prog-id=21 op=UNLOAD May 17 00:40:46.526818 kernel: audit: type=1334 audit(1747442446.514:163): prog-id=27 op=LOAD May 17 00:40:46.526951 kernel: audit: type=1334 audit(1747442446.518:164): prog-id=21 op=UNLOAD May 17 00:40:46.536000 audit: BPF prog-id=28 op=LOAD May 17 00:40:46.548159 kernel: audit: type=1334 audit(1747442446.536:165): prog-id=28 op=LOAD May 17 00:40:46.548000 audit: BPF prog-id=29 op=LOAD May 17 00:40:46.549000 audit: BPF prog-id=22 op=UNLOAD May 17 00:40:46.555113 kernel: audit: type=1334 audit(1747442446.548:166): prog-id=29 op=LOAD May 17 00:40:46.551000 audit: BPF prog-id=23 op=UNLOAD May 17 00:40:46.557000 audit: BPF prog-id=30 op=LOAD May 17 00:40:46.559000 audit: BPF prog-id=31 op=LOAD May 17 00:40:46.559000 audit: BPF prog-id=18 op=UNLOAD May 17 00:40:46.559000 audit: BPF prog-id=19 op=UNLOAD May 17 00:40:46.562000 audit: BPF prog-id=32 op=LOAD May 17 00:40:46.563000 audit: BPF prog-id=20 op=UNLOAD May 17 00:40:46.585700 systemd[1]: Finished ldconfig.service. May 17 00:40:46.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:46.591309 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:40:46.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:46.608960 systemd[1]: Starting audit-rules.service... May 17 00:40:46.627020 systemd[1]: Starting clean-ca-certificates.service... May 17 00:40:46.651145 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:40:46.678000 audit: BPF prog-id=33 op=LOAD May 17 00:40:46.694744 systemd[1]: Starting systemd-resolved.service... May 17 00:40:46.721000 audit: BPF prog-id=34 op=LOAD May 17 00:40:46.722757 systemd[1]: Starting systemd-timesyncd.service... May 17 00:40:46.730518 systemd[1]: Starting systemd-update-utmp.service... May 17 00:40:46.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:46.737659 systemd[1]: Finished clean-ca-certificates.service. May 17 00:40:46.746048 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:40:46.752430 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:40:46.752728 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:40:46.754750 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:40:46.761000 audit[1153]: SYSTEM_BOOT pid=1153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:40:46.770940 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:40:46.776148 systemd[1]: Starting modprobe@loop.service... May 17 00:40:46.779569 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:40:46.787000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:40:46.787000 audit[1158]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd99ac2730 a2=420 a3=0 items=0 ppid=1136 pid=1158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:46.787000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:40:46.779747 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:40:46.792205 augenrules[1158]: No rules May 17 00:40:46.779906 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:40:46.780073 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:40:46.782766 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:40:46.782978 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:40:46.792581 systemd[1]: Finished audit-rules.service. May 17 00:40:46.796913 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:40:46.804173 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:40:46.804331 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:40:46.810293 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:40:46.810452 systemd[1]: Finished modprobe@loop.service. May 17 00:40:46.818545 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:40:46.819216 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:40:46.826128 systemd[1]: Starting systemd-update-done.service... May 17 00:40:46.831658 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:40:46.831984 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:40:46.834365 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:40:46.839879 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:40:46.844928 systemd[1]: Starting modprobe@loop.service... May 17 00:40:46.846074 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:40:46.846231 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:40:46.846359 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:40:46.846456 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:40:46.847892 systemd[1]: Finished systemd-update-utmp.service. May 17 00:40:46.849862 systemd[1]: Finished systemd-update-done.service. May 17 00:40:46.851646 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:40:46.851810 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:40:46.853461 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:40:46.853617 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:40:46.855322 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:40:46.855467 systemd[1]: Finished modprobe@loop.service. May 17 00:40:46.858374 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:40:46.858512 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:40:46.861251 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:40:46.861504 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:40:46.866387 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:40:46.875534 systemd[1]: Starting modprobe@drm.service... May 17 00:40:46.895160 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:40:46.901112 systemd[1]: Starting modprobe@loop.service... May 17 00:40:46.902195 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:40:46.902372 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:40:46.909949 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:40:46.911581 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:40:46.911786 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:40:46.913771 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:40:46.913960 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:40:46.920045 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:40:46.920211 systemd[1]: Finished modprobe@drm.service. May 17 00:40:46.924037 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:40:46.924237 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:40:46.933633 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:40:46.933787 systemd[1]: Finished modprobe@loop.service. May 17 00:40:46.941408 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:40:46.941522 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:40:46.945050 systemd[1]: Finished ensure-sysext.service. May 17 00:40:46.987983 systemd[1]: Started systemd-timesyncd.service. May 17 00:40:46.989365 systemd[1]: Reached target time-set.target. May 17 00:40:47.528767 systemd-timesyncd[1151]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 17 00:40:47.528836 systemd-timesyncd[1151]: Initial clock synchronization to Sat 2025-05-17 00:40:47.527270 UTC. May 17 00:40:47.530498 systemd-resolved[1147]: Positive Trust Anchors: May 17 00:40:47.530517 systemd-resolved[1147]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:40:47.530552 systemd-resolved[1147]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:40:47.585462 systemd-resolved[1147]: Defaulting to hostname 'linux'. May 17 00:40:47.587555 systemd[1]: Started systemd-resolved.service. May 17 00:40:47.588780 systemd[1]: Reached target network.target. May 17 00:40:47.589721 systemd[1]: Reached target nss-lookup.target. May 17 00:40:47.590704 systemd[1]: Reached target sysinit.target. May 17 00:40:47.592351 systemd[1]: Started motdgen.path. May 17 00:40:47.596944 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:40:47.600506 systemd[1]: Started logrotate.timer. May 17 00:40:47.604016 systemd[1]: Started mdadm.timer. May 17 00:40:47.609483 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:40:47.612382 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:40:47.613076 systemd[1]: Reached target paths.target. May 17 00:40:47.615161 systemd[1]: Reached target timers.target. May 17 00:40:47.631181 systemd[1]: Listening on dbus.socket. May 17 00:40:47.637687 systemd[1]: Starting docker.socket... May 17 00:40:47.646242 systemd[1]: Listening on sshd.socket. May 17 00:40:47.647630 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:40:47.648338 systemd[1]: Listening on docker.socket. May 17 00:40:47.649662 systemd[1]: Reached target sockets.target. May 17 00:40:47.650698 systemd[1]: Reached target basic.target. May 17 00:40:47.656093 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:40:47.656141 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:40:47.671517 systemd[1]: Starting containerd.service... May 17 00:40:47.676494 systemd[1]: Starting dbus.service... May 17 00:40:47.681177 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:40:47.693019 systemd[1]: Starting extend-filesystems.service... May 17 00:40:47.695023 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:40:47.696675 systemd[1]: Starting motdgen.service... May 17 00:40:47.707565 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:40:47.720553 jq[1178]: false May 17 00:40:47.719551 systemd[1]: Starting sshd-keygen.service... May 17 00:40:47.764379 dbus-daemon[1177]: [system] SELinux support is enabled May 17 00:40:47.784010 extend-filesystems[1179]: Found loop1 May 17 00:40:47.784010 extend-filesystems[1179]: Found sr0 May 17 00:40:47.784010 extend-filesystems[1179]: Found vda May 17 00:40:47.784010 extend-filesystems[1179]: Found vda1 May 17 00:40:47.784010 extend-filesystems[1179]: Found vda2 May 17 00:40:47.784010 extend-filesystems[1179]: Found vda3 May 17 00:40:47.784010 extend-filesystems[1179]: Found usr May 17 00:40:47.784010 extend-filesystems[1179]: Found vda4 May 17 00:40:47.784010 extend-filesystems[1179]: Found vda6 May 17 00:40:47.784010 extend-filesystems[1179]: Found vda7 May 17 00:40:47.784010 extend-filesystems[1179]: Found vda9 May 17 00:40:47.784010 extend-filesystems[1179]: Checking size of /dev/vda9 May 17 00:40:47.871083 extend-filesystems[1179]: Resized partition /dev/vda9 May 17 00:40:47.804929 systemd[1]: Starting systemd-logind.service... May 17 00:40:47.813758 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:40:47.813874 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:40:47.814627 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:40:47.825124 systemd[1]: Starting update-engine.service... May 17 00:40:47.898090 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:40:47.901729 jq[1201]: true May 17 00:40:47.903190 systemd[1]: Started dbus.service. May 17 00:40:47.912001 extend-filesystems[1200]: resize2fs 1.46.5 (30-Dec-2021) May 17 00:40:47.947383 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 17 00:40:47.929607 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:40:47.929867 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:40:47.930196 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:40:47.930377 systemd[1]: Finished motdgen.service. May 17 00:40:47.934824 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:40:47.935024 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:40:47.958389 jq[1208]: true May 17 00:40:47.965900 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:40:47.965973 systemd[1]: Reached target system-config.target. May 17 00:40:47.969601 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:40:47.969629 systemd[1]: Reached target user-config.target. May 17 00:40:48.026871 update_engine[1197]: I0517 00:40:48.026265 1197 main.cc:92] Flatcar Update Engine starting May 17 00:40:48.035391 systemd[1]: Started update-engine.service. May 17 00:40:48.045037 update_engine[1197]: I0517 00:40:48.034313 1197 update_check_scheduler.cc:74] Next update check in 7m11s May 17 00:40:48.053776 systemd[1]: Started locksmithd.service. May 17 00:40:48.058769 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 17 00:40:48.114642 systemd-logind[1194]: Watching system buttons on /dev/input/event1 (Power Button) May 17 00:40:48.122031 env[1209]: time="2025-05-17T00:40:48.117987091Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:40:48.114674 systemd-logind[1194]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 17 00:40:48.121499 systemd-logind[1194]: New seat seat0. May 17 00:40:48.123001 extend-filesystems[1200]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 17 00:40:48.123001 extend-filesystems[1200]: old_desc_blocks = 1, new_desc_blocks = 1 May 17 00:40:48.123001 extend-filesystems[1200]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 17 00:40:48.154768 extend-filesystems[1179]: Resized filesystem in /dev/vda9 May 17 00:40:48.126282 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:40:48.126584 systemd[1]: Finished extend-filesystems.service. May 17 00:40:48.146132 systemd[1]: Started systemd-logind.service. May 17 00:40:48.165176 env[1209]: time="2025-05-17T00:40:48.164854010Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:40:48.165176 env[1209]: time="2025-05-17T00:40:48.165142952Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:40:48.169796 env[1209]: time="2025-05-17T00:40:48.168240522Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:40:48.169796 env[1209]: time="2025-05-17T00:40:48.168303761Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:40:48.169796 env[1209]: time="2025-05-17T00:40:48.168607451Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:40:48.169796 env[1209]: time="2025-05-17T00:40:48.168626777Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:40:48.169796 env[1209]: time="2025-05-17T00:40:48.168641705Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:40:48.169796 env[1209]: time="2025-05-17T00:40:48.168653327Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:40:48.169796 env[1209]: time="2025-05-17T00:40:48.168764796Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:40:48.169796 env[1209]: time="2025-05-17T00:40:48.169026206Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:40:48.169796 env[1209]: time="2025-05-17T00:40:48.169172220Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:40:48.169796 env[1209]: time="2025-05-17T00:40:48.169192578Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:40:48.170213 env[1209]: time="2025-05-17T00:40:48.169258322Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:40:48.170213 env[1209]: time="2025-05-17T00:40:48.169272749Z" level=info msg="metadata content store policy set" policy=shared May 17 00:40:48.201970 bash[1233]: Updated "/home/core/.ssh/authorized_keys" May 17 00:40:48.201524 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:40:48.247881 env[1209]: time="2025-05-17T00:40:48.247800534Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:40:48.247881 env[1209]: time="2025-05-17T00:40:48.247867740Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:40:48.247881 env[1209]: time="2025-05-17T00:40:48.247884101Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:40:48.248137 env[1209]: time="2025-05-17T00:40:48.247928805Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:40:48.248137 env[1209]: time="2025-05-17T00:40:48.247945626Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:40:48.248137 env[1209]: time="2025-05-17T00:40:48.247961266Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:40:48.248137 env[1209]: time="2025-05-17T00:40:48.247975523Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:40:48.248137 env[1209]: time="2025-05-17T00:40:48.247991593Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:40:48.248137 env[1209]: time="2025-05-17T00:40:48.248005920Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:40:48.248137 env[1209]: time="2025-05-17T00:40:48.248020757Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:40:48.248137 env[1209]: time="2025-05-17T00:40:48.248034303Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:40:48.248137 env[1209]: time="2025-05-17T00:40:48.248048009Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:40:48.248459 env[1209]: time="2025-05-17T00:40:48.248215563Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:40:48.248459 env[1209]: time="2025-05-17T00:40:48.248304019Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:40:48.248633 env[1209]: time="2025-05-17T00:40:48.248572883Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:40:48.248633 env[1209]: time="2025-05-17T00:40:48.248604312Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:40:48.248633 env[1209]: time="2025-05-17T00:40:48.248619500Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:40:48.248784 env[1209]: time="2025-05-17T00:40:48.248666338Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:40:48.248784 env[1209]: time="2025-05-17T00:40:48.248680134Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:40:48.248784 env[1209]: time="2025-05-17T00:40:48.248694371Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:40:48.248784 env[1209]: time="2025-05-17T00:40:48.248708097Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:40:48.248784 env[1209]: time="2025-05-17T00:40:48.248722664Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:40:48.248784 env[1209]: time="2025-05-17T00:40:48.248762038Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:40:48.248784 env[1209]: time="2025-05-17T00:40:48.248776375Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:40:48.249011 env[1209]: time="2025-05-17T00:40:48.248788918Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:40:48.249011 env[1209]: time="2025-05-17T00:40:48.248803085Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:40:48.249011 env[1209]: time="2025-05-17T00:40:48.248925184Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:40:48.249011 env[1209]: time="2025-05-17T00:40:48.248940863Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:40:48.249011 env[1209]: time="2025-05-17T00:40:48.248954970Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:40:48.249011 env[1209]: time="2025-05-17T00:40:48.248967393Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:40:48.249011 env[1209]: time="2025-05-17T00:40:48.248983904Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:40:48.249011 env[1209]: time="2025-05-17T00:40:48.248996578Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:40:48.249298 env[1209]: time="2025-05-17T00:40:48.249023639Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:40:48.249298 env[1209]: time="2025-05-17T00:40:48.249067310Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:40:48.249402 env[1209]: time="2025-05-17T00:40:48.249341685Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:40:48.253821 env[1209]: time="2025-05-17T00:40:48.249408791Z" level=info msg="Connect containerd service" May 17 00:40:48.253821 env[1209]: time="2025-05-17T00:40:48.249450920Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:40:48.253821 env[1209]: time="2025-05-17T00:40:48.250036478Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:40:48.253821 env[1209]: time="2025-05-17T00:40:48.250280716Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:40:48.253821 env[1209]: time="2025-05-17T00:40:48.250327805Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:40:48.253821 env[1209]: time="2025-05-17T00:40:48.250375454Z" level=info msg="containerd successfully booted in 0.179722s" May 17 00:40:48.253821 env[1209]: time="2025-05-17T00:40:48.252364435Z" level=info msg="Start subscribing containerd event" May 17 00:40:48.253821 env[1209]: time="2025-05-17T00:40:48.252423486Z" level=info msg="Start recovering state" May 17 00:40:48.253821 env[1209]: time="2025-05-17T00:40:48.252485853Z" level=info msg="Start event monitor" May 17 00:40:48.253821 env[1209]: time="2025-05-17T00:40:48.252509036Z" level=info msg="Start snapshots syncer" May 17 00:40:48.253821 env[1209]: time="2025-05-17T00:40:48.252517873Z" level=info msg="Start cni network conf syncer for default" May 17 00:40:48.253821 env[1209]: time="2025-05-17T00:40:48.252525377Z" level=info msg="Start streaming server" May 17 00:40:48.251435 systemd[1]: Started containerd.service. May 17 00:40:48.280217 locksmithd[1234]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:40:48.780834 sshd_keygen[1193]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:40:48.815877 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:40:48.827867 systemd[1]: Reached target network-online.target. May 17 00:40:48.854814 systemd[1]: Starting kubelet.service... May 17 00:40:48.858196 systemd[1]: Finished sshd-keygen.service. May 17 00:40:48.868348 systemd[1]: Starting issuegen.service... May 17 00:40:48.884150 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:40:48.884400 systemd[1]: Finished issuegen.service. May 17 00:40:48.902767 systemd[1]: Starting systemd-user-sessions.service... May 17 00:40:48.920521 systemd[1]: Finished systemd-user-sessions.service. May 17 00:40:48.925922 systemd[1]: Started getty@tty1.service. May 17 00:40:48.931942 systemd[1]: Started serial-getty@ttyS0.service. May 17 00:40:48.936950 systemd[1]: Reached target getty.target. May 17 00:40:51.094186 systemd[1]: Started kubelet.service. May 17 00:40:51.101281 systemd[1]: Reached target multi-user.target. May 17 00:40:51.106793 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:40:51.136232 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:40:51.136480 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:40:51.138067 systemd[1]: Startup finished in 883ms (kernel) + 5.028s (initrd) + 14.661s (userspace) = 20.573s. May 17 00:40:52.308851 kubelet[1263]: E0517 00:40:52.308575 1263 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:40:52.315080 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:40:52.318700 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:40:52.322823 systemd[1]: kubelet.service: Consumed 1.841s CPU time. May 17 00:40:55.187613 systemd[1]: Created slice system-sshd.slice. May 17 00:40:55.188993 systemd[1]: Started sshd@0-10.0.0.142:22-10.0.0.1:38804.service. May 17 00:40:55.234327 sshd[1272]: Accepted publickey for core from 10.0.0.1 port 38804 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:40:55.236624 sshd[1272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:55.248956 systemd-logind[1194]: New session 1 of user core. May 17 00:40:55.250405 systemd[1]: Created slice user-500.slice. May 17 00:40:55.252184 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:40:55.262943 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:40:55.265161 systemd[1]: Starting user@500.service... May 17 00:40:55.268465 (systemd)[1275]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:55.384868 systemd[1275]: Queued start job for default target default.target. May 17 00:40:55.385621 systemd[1275]: Reached target paths.target. May 17 00:40:55.385647 systemd[1275]: Reached target sockets.target. May 17 00:40:55.385668 systemd[1275]: Reached target timers.target. May 17 00:40:55.385688 systemd[1275]: Reached target basic.target. May 17 00:40:55.385793 systemd[1275]: Reached target default.target. May 17 00:40:55.385841 systemd[1275]: Startup finished in 110ms. May 17 00:40:55.385947 systemd[1]: Started user@500.service. May 17 00:40:55.388896 systemd[1]: Started session-1.scope. May 17 00:40:55.445776 systemd[1]: Started sshd@1-10.0.0.142:22-10.0.0.1:38818.service. May 17 00:40:55.481379 sshd[1284]: Accepted publickey for core from 10.0.0.1 port 38818 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:40:55.482921 sshd[1284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:55.487502 systemd-logind[1194]: New session 2 of user core. May 17 00:40:55.488524 systemd[1]: Started session-2.scope. May 17 00:40:55.547827 sshd[1284]: pam_unix(sshd:session): session closed for user core May 17 00:40:55.551893 systemd[1]: sshd@1-10.0.0.142:22-10.0.0.1:38818.service: Deactivated successfully. May 17 00:40:55.552680 systemd[1]: session-2.scope: Deactivated successfully. May 17 00:40:55.553607 systemd-logind[1194]: Session 2 logged out. Waiting for processes to exit. May 17 00:40:55.555054 systemd[1]: Started sshd@2-10.0.0.142:22-10.0.0.1:38834.service. May 17 00:40:55.556117 systemd-logind[1194]: Removed session 2. May 17 00:40:55.590932 sshd[1290]: Accepted publickey for core from 10.0.0.1 port 38834 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:40:55.592685 sshd[1290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:55.597254 systemd-logind[1194]: New session 3 of user core. May 17 00:40:55.598401 systemd[1]: Started session-3.scope. May 17 00:40:55.650508 sshd[1290]: pam_unix(sshd:session): session closed for user core May 17 00:40:55.653794 systemd[1]: sshd@2-10.0.0.142:22-10.0.0.1:38834.service: Deactivated successfully. May 17 00:40:55.654415 systemd[1]: session-3.scope: Deactivated successfully. May 17 00:40:55.654980 systemd-logind[1194]: Session 3 logged out. Waiting for processes to exit. May 17 00:40:55.656275 systemd[1]: Started sshd@3-10.0.0.142:22-10.0.0.1:38848.service. May 17 00:40:55.657305 systemd-logind[1194]: Removed session 3. May 17 00:40:55.691463 sshd[1296]: Accepted publickey for core from 10.0.0.1 port 38848 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:40:55.693250 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:55.697558 systemd-logind[1194]: New session 4 of user core. May 17 00:40:55.698509 systemd[1]: Started session-4.scope. May 17 00:40:55.756593 sshd[1296]: pam_unix(sshd:session): session closed for user core May 17 00:40:55.760372 systemd[1]: sshd@3-10.0.0.142:22-10.0.0.1:38848.service: Deactivated successfully. May 17 00:40:55.761068 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:40:55.761619 systemd-logind[1194]: Session 4 logged out. Waiting for processes to exit. May 17 00:40:55.763215 systemd[1]: Started sshd@4-10.0.0.142:22-10.0.0.1:38858.service. May 17 00:40:55.764194 systemd-logind[1194]: Removed session 4. May 17 00:40:55.796621 sshd[1302]: Accepted publickey for core from 10.0.0.1 port 38858 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:40:55.798005 sshd[1302]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:55.802294 systemd-logind[1194]: New session 5 of user core. May 17 00:40:55.803770 systemd[1]: Started session-5.scope. May 17 00:40:55.865966 sudo[1305]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:40:55.866275 sudo[1305]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:40:55.878098 dbus-daemon[1177]: н\\u0019}U: received setenforce notice (enforcing=1839909856) May 17 00:40:55.880387 sudo[1305]: pam_unix(sudo:session): session closed for user root May 17 00:40:55.882771 sshd[1302]: pam_unix(sshd:session): session closed for user core May 17 00:40:55.886374 systemd[1]: sshd@4-10.0.0.142:22-10.0.0.1:38858.service: Deactivated successfully. May 17 00:40:55.887069 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:40:55.887850 systemd-logind[1194]: Session 5 logged out. Waiting for processes to exit. May 17 00:40:55.889181 systemd[1]: Started sshd@5-10.0.0.142:22-10.0.0.1:38860.service. May 17 00:40:55.890009 systemd-logind[1194]: Removed session 5. May 17 00:40:55.923590 sshd[1309]: Accepted publickey for core from 10.0.0.1 port 38860 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:40:55.925105 sshd[1309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:55.929780 systemd-logind[1194]: New session 6 of user core. May 17 00:40:55.930638 systemd[1]: Started session-6.scope. May 17 00:40:55.986422 sudo[1313]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:40:55.986691 sudo[1313]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:40:55.990623 sudo[1313]: pam_unix(sudo:session): session closed for user root May 17 00:40:55.996283 sudo[1312]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:40:55.996519 sudo[1312]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:40:56.006103 systemd[1]: Stopping audit-rules.service... May 17 00:40:56.006000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:40:56.007548 auditctl[1316]: No rules May 17 00:40:56.008260 kernel: kauditd_printk_skb: 17 callbacks suppressed May 17 00:40:56.008316 kernel: audit: type=1305 audit(1747442456.006:182): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:40:56.006000 audit[1316]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd44c1ff20 a2=420 a3=0 items=0 ppid=1 pid=1316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:56.014774 kernel: audit: type=1300 audit(1747442456.006:182): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd44c1ff20 a2=420 a3=0 items=0 ppid=1 pid=1316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:56.014846 kernel: audit: type=1327 audit(1747442456.006:182): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:40:56.006000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:40:56.015239 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:40:56.015470 systemd[1]: Stopped audit-rules.service. May 17 00:40:56.016197 kernel: audit: type=1131 audit(1747442456.014:183): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:56.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:56.020036 systemd[1]: Starting audit-rules.service... May 17 00:40:56.041611 augenrules[1333]: No rules May 17 00:40:56.042442 systemd[1]: Finished audit-rules.service. May 17 00:40:56.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:56.043710 sudo[1312]: pam_unix(sudo:session): session closed for user root May 17 00:40:56.045332 sshd[1309]: pam_unix(sshd:session): session closed for user core May 17 00:40:56.043000 audit[1312]: USER_END pid=1312 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:40:56.050218 systemd[1]: sshd@5-10.0.0.142:22-10.0.0.1:38860.service: Deactivated successfully. May 17 00:40:56.050905 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:40:56.051098 kernel: audit: type=1130 audit(1747442456.041:184): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:56.051144 kernel: audit: type=1106 audit(1747442456.043:185): pid=1312 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:40:56.051167 kernel: audit: type=1104 audit(1747442456.043:186): pid=1312 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:40:56.043000 audit[1312]: CRED_DISP pid=1312 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:40:56.051544 systemd-logind[1194]: Session 6 logged out. Waiting for processes to exit. May 17 00:40:56.052908 systemd[1]: Started sshd@6-10.0.0.142:22-10.0.0.1:38876.service. May 17 00:40:56.054044 systemd-logind[1194]: Removed session 6. May 17 00:40:56.045000 audit[1309]: USER_END pid=1309 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:40:56.060268 kernel: audit: type=1106 audit(1747442456.045:187): pid=1309 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:40:56.060335 kernel: audit: type=1104 audit(1747442456.045:188): pid=1309 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:40:56.045000 audit[1309]: CRED_DISP pid=1309 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:40:56.064356 kernel: audit: type=1131 audit(1747442456.049:189): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.142:22-10.0.0.1:38860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:56.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.142:22-10.0.0.1:38860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:56.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.142:22-10.0.0.1:38876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:56.088000 audit[1339]: USER_ACCT pid=1339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:40:56.089725 sshd[1339]: Accepted publickey for core from 10.0.0.1 port 38876 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:40:56.089000 audit[1339]: CRED_ACQ pid=1339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:40:56.089000 audit[1339]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffda7a08f0 a2=3 a3=0 items=0 ppid=1 pid=1339 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:56.089000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:56.090857 sshd[1339]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:56.094575 systemd-logind[1194]: New session 7 of user core. May 17 00:40:56.095494 systemd[1]: Started session-7.scope. May 17 00:40:56.099000 audit[1339]: USER_START pid=1339 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:40:56.100000 audit[1342]: CRED_ACQ pid=1342 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:40:56.148000 audit[1343]: USER_ACCT pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:40:56.148000 audit[1343]: CRED_REFR pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:40:56.148878 sudo[1343]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:40:56.149113 sudo[1343]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:40:56.150000 audit[1343]: USER_START pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:40:56.163181 systemd[1]: Starting coreos-metadata.service... May 17 00:40:56.170095 systemd[1]: coreos-metadata.service: Deactivated successfully. May 17 00:40:56.170289 systemd[1]: Finished coreos-metadata.service. May 17 00:40:56.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:56.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:56.755605 systemd[1]: Stopped kubelet.service. May 17 00:40:56.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:56.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:56.755827 systemd[1]: kubelet.service: Consumed 1.841s CPU time. May 17 00:40:56.757858 systemd[1]: Starting kubelet.service... May 17 00:40:56.779694 systemd[1]: Reloading. May 17 00:40:56.869347 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-05-17T00:40:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:40:56.869704 /usr/lib/systemd/system-generators/torcx-generator[1403]: time="2025-05-17T00:40:56Z" level=info msg="torcx already run" May 17 00:40:58.414040 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:40:58.414075 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:40:58.450722 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:40:58.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.538000 audit: BPF prog-id=40 op=LOAD May 17 00:40:58.538000 audit: BPF prog-id=35 op=UNLOAD May 17 00:40:58.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.538000 audit: BPF prog-id=41 op=LOAD May 17 00:40:58.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.538000 audit: BPF prog-id=42 op=LOAD May 17 00:40:58.538000 audit: BPF prog-id=36 op=UNLOAD May 17 00:40:58.538000 audit: BPF prog-id=37 op=UNLOAD May 17 00:40:58.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.542000 audit: BPF prog-id=43 op=LOAD May 17 00:40:58.542000 audit: BPF prog-id=24 op=UNLOAD May 17 00:40:58.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.542000 audit: BPF prog-id=44 op=LOAD May 17 00:40:58.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.542000 audit: BPF prog-id=45 op=LOAD May 17 00:40:58.542000 audit: BPF prog-id=25 op=UNLOAD May 17 00:40:58.542000 audit: BPF prog-id=26 op=UNLOAD May 17 00:40:58.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.544000 audit: BPF prog-id=46 op=LOAD May 17 00:40:58.544000 audit: BPF prog-id=27 op=UNLOAD May 17 00:40:58.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.545000 audit: BPF prog-id=47 op=LOAD May 17 00:40:58.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.545000 audit: BPF prog-id=48 op=LOAD May 17 00:40:58.545000 audit: BPF prog-id=28 op=UNLOAD May 17 00:40:58.545000 audit: BPF prog-id=29 op=UNLOAD May 17 00:40:58.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.547000 audit: BPF prog-id=49 op=LOAD May 17 00:40:58.547000 audit: BPF prog-id=38 op=UNLOAD May 17 00:40:58.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.549000 audit: BPF prog-id=50 op=LOAD May 17 00:40:58.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.549000 audit: BPF prog-id=51 op=LOAD May 17 00:40:58.549000 audit: BPF prog-id=30 op=UNLOAD May 17 00:40:58.549000 audit: BPF prog-id=31 op=UNLOAD May 17 00:40:58.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.550000 audit: BPF prog-id=52 op=LOAD May 17 00:40:58.550000 audit: BPF prog-id=33 op=UNLOAD May 17 00:40:58.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.552000 audit: BPF prog-id=53 op=LOAD May 17 00:40:58.552000 audit: BPF prog-id=34 op=UNLOAD May 17 00:40:58.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:58.554000 audit: BPF prog-id=54 op=LOAD May 17 00:40:58.554000 audit: BPF prog-id=32 op=UNLOAD May 17 00:40:58.568289 systemd[1]: Started kubelet.service. May 17 00:40:58.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.572089 systemd[1]: Stopping kubelet.service... May 17 00:40:58.572511 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:40:58.572766 systemd[1]: Stopped kubelet.service. May 17 00:40:58.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.574951 systemd[1]: Starting kubelet.service... May 17 00:40:58.695070 systemd[1]: Started kubelet.service. May 17 00:40:58.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.737481 kubelet[1454]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:40:58.737481 kubelet[1454]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:40:58.737481 kubelet[1454]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:40:58.738051 kubelet[1454]: I0517 00:40:58.737558 1454 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:40:59.257092 kubelet[1454]: I0517 00:40:59.254941 1454 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" May 17 00:40:59.257092 kubelet[1454]: I0517 00:40:59.254976 1454 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:40:59.257092 kubelet[1454]: I0517 00:40:59.255303 1454 server.go:954] "Client rotation is on, will bootstrap in background" May 17 00:40:59.411018 kubelet[1454]: I0517 00:40:59.410225 1454 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:40:59.486840 kubelet[1454]: E0517 00:40:59.482572 1454 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:40:59.486840 kubelet[1454]: I0517 00:40:59.482639 1454 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:40:59.502966 kubelet[1454]: I0517 00:40:59.502905 1454 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:40:59.503298 kubelet[1454]: I0517 00:40:59.503244 1454 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:40:59.503532 kubelet[1454]: I0517 00:40:59.503291 1454 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.142","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:40:59.503667 kubelet[1454]: I0517 00:40:59.503538 1454 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:40:59.503667 kubelet[1454]: I0517 00:40:59.503554 1454 container_manager_linux.go:304] "Creating device plugin manager" May 17 00:40:59.503860 kubelet[1454]: I0517 00:40:59.503828 1454 state_mem.go:36] "Initialized new in-memory state store" May 17 00:40:59.519980 kubelet[1454]: I0517 00:40:59.519806 1454 kubelet.go:446] "Attempting to sync node with API server" May 17 00:40:59.519980 kubelet[1454]: I0517 00:40:59.519879 1454 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:40:59.519980 kubelet[1454]: I0517 00:40:59.519908 1454 kubelet.go:352] "Adding apiserver pod source" May 17 00:40:59.519980 kubelet[1454]: I0517 00:40:59.519921 1454 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:40:59.522611 kubelet[1454]: E0517 00:40:59.522564 1454 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:59.522786 kubelet[1454]: E0517 00:40:59.522638 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:40:59.533444 kubelet[1454]: I0517 00:40:59.533233 1454 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:40:59.535922 kubelet[1454]: I0517 00:40:59.533849 1454 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:40:59.535922 kubelet[1454]: W0517 00:40:59.533934 1454 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:40:59.536413 kubelet[1454]: I0517 00:40:59.536385 1454 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:40:59.536473 kubelet[1454]: I0517 00:40:59.536435 1454 server.go:1287] "Started kubelet" May 17 00:40:59.537000 audit[1454]: AVC avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:59.537000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:40:59.537000 audit[1454]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a0cf00 a1=c00065c840 a2=c000a0ced0 a3=25 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:59.537000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:40:59.537000 audit[1454]: AVC avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:40:59.537000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:40:59.537000 audit[1454]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a2e380 a1=c00065c858 a2=c000a0cf90 a3=25 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:59.537000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:40:59.539086 kubelet[1454]: I0517 00:40:59.537021 1454 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:40:59.539086 kubelet[1454]: I0517 00:40:59.537444 1454 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:40:59.539086 kubelet[1454]: I0517 00:40:59.537506 1454 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:40:59.539086 kubelet[1454]: I0517 00:40:59.538101 1454 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:40:59.539086 kubelet[1454]: I0517 00:40:59.538149 1454 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:40:59.539086 kubelet[1454]: I0517 00:40:59.538219 1454 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:40:59.539086 kubelet[1454]: I0517 00:40:59.538581 1454 server.go:479] "Adding debug handlers to kubelet server" May 17 00:40:59.546547 kubelet[1454]: I0517 00:40:59.545165 1454 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:40:59.552083 kubelet[1454]: E0517 00:40:59.551367 1454 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.142\" not found" May 17 00:40:59.554835 kubelet[1454]: E0517 00:40:59.553792 1454 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.142\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" May 17 00:40:59.554835 kubelet[1454]: I0517 00:40:59.553897 1454 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:40:59.554835 kubelet[1454]: I0517 00:40:59.553989 1454 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:40:59.554835 kubelet[1454]: I0517 00:40:59.554055 1454 reconciler.go:26] "Reconciler: start to sync state" May 17 00:40:59.554835 kubelet[1454]: W0517 00:40:59.554556 1454 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.0.0.142" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope May 17 00:40:59.554835 kubelet[1454]: E0517 00:40:59.554611 1454 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.0.0.142\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" May 17 00:40:59.554835 kubelet[1454]: W0517 00:40:59.554694 1454 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope May 17 00:40:59.554835 kubelet[1454]: E0517 00:40:59.554722 1454 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" May 17 00:40:59.560811 kubelet[1454]: I0517 00:40:59.559587 1454 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:40:59.576467 kubelet[1454]: E0517 00:40:59.569203 1454 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:40:59.576467 kubelet[1454]: I0517 00:40:59.574689 1454 factory.go:221] Registration of the containerd container factory successfully May 17 00:40:59.576467 kubelet[1454]: I0517 00:40:59.574722 1454 factory.go:221] Registration of the systemd container factory successfully May 17 00:40:59.584524 kubelet[1454]: W0517 00:40:59.584464 1454 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope May 17 00:40:59.586162 kubelet[1454]: E0517 00:40:59.584857 1454 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" May 17 00:40:59.588309 kubelet[1454]: E0517 00:40:59.584847 1454 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.142.184029a89a1a3fe2 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.142,UID:10.0.0.142,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.0.0.142,},FirstTimestamp:2025-05-17 00:40:59.536408546 +0000 UTC m=+0.836610954,LastTimestamp:2025-05-17 00:40:59.536408546 +0000 UTC m=+0.836610954,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.142,}" May 17 00:40:59.603606 kubelet[1454]: I0517 00:40:59.603120 1454 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:40:59.603606 kubelet[1454]: I0517 00:40:59.603149 1454 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:40:59.603606 kubelet[1454]: I0517 00:40:59.603173 1454 state_mem.go:36] "Initialized new in-memory state store" May 17 00:40:59.611583 kubelet[1454]: E0517 00:40:59.611453 1454 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.142.184029a89c0e5ffd default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.142,UID:10.0.0.142,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.0.0.142,},FirstTimestamp:2025-05-17 00:40:59.569184765 +0000 UTC m=+0.869387153,LastTimestamp:2025-05-17 00:40:59.569184765 +0000 UTC m=+0.869387153,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.142,}" May 17 00:40:59.627000 audit[1471]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1471 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:59.627000 audit[1471]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffee36724e0 a2=0 a3=7ffee36724cc items=0 ppid=1454 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:59.627000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:40:59.629756 kubelet[1454]: E0517 00:40:59.628956 1454 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.142.184029a89e06bbba default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.142,UID:10.0.0.142,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.0.0.142 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.0.0.142,},FirstTimestamp:2025-05-17 00:40:59.602238394 +0000 UTC m=+0.902440782,LastTimestamp:2025-05-17 00:40:59.602238394 +0000 UTC m=+0.902440782,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.142,}" May 17 00:40:59.628000 audit[1477]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1477 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:59.628000 audit[1477]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff24a16c20 a2=0 a3=7fff24a16c0c items=0 ppid=1454 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:59.628000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:40:59.653486 kubelet[1454]: E0517 00:40:59.653310 1454 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.142\" not found" May 17 00:40:59.661181 kubelet[1454]: E0517 00:40:59.660432 1454 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.142.184029a89e06cf92 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.142,UID:10.0.0.142,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 10.0.0.142 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:10.0.0.142,},FirstTimestamp:2025-05-17 00:40:59.602243474 +0000 UTC m=+0.902445862,LastTimestamp:2025-05-17 00:40:59.602243474 +0000 UTC m=+0.902445862,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.142,}" May 17 00:40:59.691658 kubelet[1454]: E0517 00:40:59.691272 1454 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.142.184029a89e06dccc default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.142,UID:10.0.0.142,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 10.0.0.142 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:10.0.0.142,},FirstTimestamp:2025-05-17 00:40:59.60224686 +0000 UTC m=+0.902449248,LastTimestamp:2025-05-17 00:40:59.60224686 +0000 UTC m=+0.902449248,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.142,}" May 17 00:40:59.753755 kubelet[1454]: E0517 00:40:59.753682 1454 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.142\" not found" May 17 00:40:59.767019 kubelet[1454]: E0517 00:40:59.766801 1454 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.142\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" May 17 00:40:59.854365 kubelet[1454]: E0517 00:40:59.854039 1454 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.142\" not found" May 17 00:40:59.954456 kubelet[1454]: E0517 00:40:59.954390 1454 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.142\" not found" May 17 00:41:00.002927 kubelet[1454]: I0517 00:40:59.998461 1454 policy_none.go:49] "None policy: Start" May 17 00:41:00.002927 kubelet[1454]: I0517 00:40:59.998511 1454 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:41:00.002927 kubelet[1454]: I0517 00:40:59.998531 1454 state_mem.go:35] "Initializing new in-memory state store" May 17 00:41:00.009871 systemd[1]: Created slice kubepods.slice. May 17 00:41:00.043260 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:41:00.049311 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:41:00.065358 kubelet[1454]: E0517 00:41:00.057000 1454 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.142\" not found" May 17 00:40:59.636000 audit[1479]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1479 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:40:59.636000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc8a7cb830 a2=0 a3=7ffc8a7cb81c items=0 ppid=1454 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:59.636000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:41:00.074000 audit[1454]: AVC avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:00.074000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:41:00.074000 audit[1454]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e97d10 a1=c0007b7770 a2=c000e97ce0 a3=25 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:00.074000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:41:00.075813 kubelet[1454]: I0517 00:41:00.075407 1454 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:41:00.075813 kubelet[1454]: I0517 00:41:00.075527 1454 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:41:00.075813 kubelet[1454]: I0517 00:41:00.075690 1454 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:41:00.075813 kubelet[1454]: I0517 00:41:00.075704 1454 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:41:00.077465 kubelet[1454]: I0517 00:41:00.076512 1454 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:41:00.098242 kubelet[1454]: E0517 00:41:00.096455 1454 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:41:00.098242 kubelet[1454]: E0517 00:41:00.096523 1454 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.142\" not found" May 17 00:41:00.073000 audit[1484]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1484 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:00.073000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffc5619140 a2=0 a3=7fffc561912c items=0 ppid=1454 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:00.073000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:41:00.182048 kubelet[1454]: I0517 00:41:00.180904 1454 kubelet_node_status.go:75] "Attempting to register node" node="10.0.0.142" May 17 00:41:00.206259 kubelet[1454]: I0517 00:41:00.206056 1454 kubelet_node_status.go:78] "Successfully registered node" node="10.0.0.142" May 17 00:41:00.206259 kubelet[1454]: E0517 00:41:00.206091 1454 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"10.0.0.142\": node \"10.0.0.142\" not found" May 17 00:41:00.206259 kubelet[1454]: E0517 00:41:00.206190 1454 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.142\" not found" node="10.0.0.142" May 17 00:41:00.207000 audit[1489]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1489 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:00.207000 audit[1489]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc1f813c30 a2=0 a3=7ffc1f813c1c items=0 ppid=1454 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:00.207000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:41:00.221197 kubelet[1454]: I0517 00:41:00.220822 1454 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:41:00.223000 audit[1491]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:00.223000 audit[1491]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7ce4b0d0 a2=0 a3=7ffe7ce4b0bc items=0 ppid=1454 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:00.223000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:41:00.225000 audit[1490]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:00.225000 audit[1490]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd806d5170 a2=0 a3=7ffd806d515c items=0 ppid=1454 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:00.225000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:41:00.228000 audit[1493]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1493 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:00.228000 audit[1493]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff6b49f9a0 a2=0 a3=7fff6b49f98c items=0 ppid=1454 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:00.228000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:41:00.228000 audit[1494]: NETFILTER_CFG table=nat:10 family=10 entries=2 op=nft_register_chain pid=1494 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:00.228000 audit[1494]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffec2672070 a2=0 a3=7ffec267205c items=0 ppid=1454 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:00.228000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:41:00.232297 kubelet[1454]: I0517 00:41:00.228785 1454 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:41:00.232297 kubelet[1454]: I0517 00:41:00.228826 1454 status_manager.go:227] "Starting to sync pod status with apiserver" May 17 00:41:00.232297 kubelet[1454]: I0517 00:41:00.228863 1454 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:41:00.232297 kubelet[1454]: I0517 00:41:00.228876 1454 kubelet.go:2382] "Starting kubelet main sync loop" May 17 00:41:00.232297 kubelet[1454]: E0517 00:41:00.229041 1454 kubelet.go:2406] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 17 00:41:00.236000 audit[1495]: NETFILTER_CFG table=filter:11 family=10 entries=2 op=nft_register_chain pid=1495 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:00.236000 audit[1495]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffd0d26910 a2=0 a3=7fffd0d268fc items=0 ppid=1454 pid=1495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:00.236000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:41:00.237000 audit[1492]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=1492 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:00.237000 audit[1492]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff1dce5260 a2=0 a3=7fff1dce524c items=0 ppid=1454 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:00.237000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:41:00.237000 audit[1496]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1496 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:00.237000 audit[1496]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe5285d950 a2=0 a3=7ffe5285d93c items=0 ppid=1454 pid=1496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:00.237000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:41:00.287132 kubelet[1454]: I0517 00:41:00.286298 1454 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 17 00:41:00.287132 kubelet[1454]: E0517 00:41:00.286569 1454 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.139:6443/api/v1/namespaces/default/events\": read tcp 10.0.0.142:54480->10.0.0.139:6443: use of closed network connection" event="&Event{ObjectMeta:{10.0.0.142.184029a89e06cf92 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.142,UID:10.0.0.142,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 10.0.0.142 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:10.0.0.142,},FirstTimestamp:2025-05-17 00:40:59.602243474 +0000 UTC m=+0.902445862,LastTimestamp:2025-05-17 00:41:00.180819136 +0000 UTC m=+1.481021534,Count:2,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.142,}" May 17 00:41:00.287132 kubelet[1454]: E0517 00:41:00.286809 1454 kubelet_node_status.go:548] "Error updating node status, will retry" err="failed to patch status \"{}\" for node \"10.0.0.142\": Patch \"https://10.0.0.139:6443/api/v1/nodes/10.0.0.142/status?timeout=10s\": read tcp 10.0.0.142:54480->10.0.0.139:6443: use of closed network connection" May 17 00:41:00.337422 kubelet[1454]: I0517 00:41:00.337339 1454 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 17 00:41:00.338049 env[1209]: time="2025-05-17T00:41:00.337983311Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:41:00.342058 kubelet[1454]: I0517 00:41:00.341517 1454 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 17 00:41:00.523345 kubelet[1454]: E0517 00:41:00.522708 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:00.523345 kubelet[1454]: I0517 00:41:00.522911 1454 apiserver.go:52] "Watching apiserver" May 17 00:41:00.526906 kubelet[1454]: E0517 00:41:00.526859 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-959dd" podUID="89a8ad48-0dd5-49a4-8e14-981634b82dde" May 17 00:41:00.544026 systemd[1]: Created slice kubepods-besteffort-pod6a6c4b20_86c1_4942_b2b8_b46cb033fb6a.slice. May 17 00:41:00.568752 kubelet[1454]: I0517 00:41:00.568673 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/6a6c4b20-86c1-4942-b2b8-b46cb033fb6a-cni-bin-dir\") pod \"calico-node-cs6n6\" (UID: \"6a6c4b20-86c1-4942-b2b8-b46cb033fb6a\") " pod="calico-system/calico-node-cs6n6" May 17 00:41:00.569058 kubelet[1454]: I0517 00:41:00.569034 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/6a6c4b20-86c1-4942-b2b8-b46cb033fb6a-policysync\") pod \"calico-node-cs6n6\" (UID: \"6a6c4b20-86c1-4942-b2b8-b46cb033fb6a\") " pod="calico-system/calico-node-cs6n6" May 17 00:41:00.569192 kubelet[1454]: I0517 00:41:00.569172 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/6a6c4b20-86c1-4942-b2b8-b46cb033fb6a-var-run-calico\") pod \"calico-node-cs6n6\" (UID: \"6a6c4b20-86c1-4942-b2b8-b46cb033fb6a\") " pod="calico-system/calico-node-cs6n6" May 17 00:41:00.569298 kubelet[1454]: I0517 00:41:00.569273 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k2bc4\" (UniqueName: \"kubernetes.io/projected/6a6c4b20-86c1-4942-b2b8-b46cb033fb6a-kube-api-access-k2bc4\") pod \"calico-node-cs6n6\" (UID: \"6a6c4b20-86c1-4942-b2b8-b46cb033fb6a\") " pod="calico-system/calico-node-cs6n6" May 17 00:41:00.569788 kubelet[1454]: I0517 00:41:00.569510 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/6a6c4b20-86c1-4942-b2b8-b46cb033fb6a-cni-log-dir\") pod \"calico-node-cs6n6\" (UID: \"6a6c4b20-86c1-4942-b2b8-b46cb033fb6a\") " pod="calico-system/calico-node-cs6n6" May 17 00:41:00.569788 kubelet[1454]: I0517 00:41:00.569683 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/6a6c4b20-86c1-4942-b2b8-b46cb033fb6a-cni-net-dir\") pod \"calico-node-cs6n6\" (UID: \"6a6c4b20-86c1-4942-b2b8-b46cb033fb6a\") " pod="calico-system/calico-node-cs6n6" May 17 00:41:00.570511 kubelet[1454]: I0517 00:41:00.570058 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/6a6c4b20-86c1-4942-b2b8-b46cb033fb6a-flexvol-driver-host\") pod \"calico-node-cs6n6\" (UID: \"6a6c4b20-86c1-4942-b2b8-b46cb033fb6a\") " pod="calico-system/calico-node-cs6n6" May 17 00:41:00.570511 kubelet[1454]: I0517 00:41:00.570082 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6a6c4b20-86c1-4942-b2b8-b46cb033fb6a-var-lib-calico\") pod \"calico-node-cs6n6\" (UID: \"6a6c4b20-86c1-4942-b2b8-b46cb033fb6a\") " pod="calico-system/calico-node-cs6n6" May 17 00:41:00.570511 kubelet[1454]: I0517 00:41:00.570109 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/89a8ad48-0dd5-49a4-8e14-981634b82dde-registration-dir\") pod \"csi-node-driver-959dd\" (UID: \"89a8ad48-0dd5-49a4-8e14-981634b82dde\") " pod="calico-system/csi-node-driver-959dd" May 17 00:41:00.570511 kubelet[1454]: I0517 00:41:00.570127 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6a6c4b20-86c1-4942-b2b8-b46cb033fb6a-lib-modules\") pod \"calico-node-cs6n6\" (UID: \"6a6c4b20-86c1-4942-b2b8-b46cb033fb6a\") " pod="calico-system/calico-node-cs6n6" May 17 00:41:00.570511 kubelet[1454]: I0517 00:41:00.570145 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/6a6c4b20-86c1-4942-b2b8-b46cb033fb6a-node-certs\") pod \"calico-node-cs6n6\" (UID: \"6a6c4b20-86c1-4942-b2b8-b46cb033fb6a\") " pod="calico-system/calico-node-cs6n6" May 17 00:41:00.570688 kubelet[1454]: I0517 00:41:00.570164 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6a6c4b20-86c1-4942-b2b8-b46cb033fb6a-tigera-ca-bundle\") pod \"calico-node-cs6n6\" (UID: \"6a6c4b20-86c1-4942-b2b8-b46cb033fb6a\") " pod="calico-system/calico-node-cs6n6" May 17 00:41:00.570688 kubelet[1454]: I0517 00:41:00.570181 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6a6c4b20-86c1-4942-b2b8-b46cb033fb6a-xtables-lock\") pod \"calico-node-cs6n6\" (UID: \"6a6c4b20-86c1-4942-b2b8-b46cb033fb6a\") " pod="calico-system/calico-node-cs6n6" May 17 00:41:00.574934 kubelet[1454]: I0517 00:41:00.571494 1454 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:41:00.575294 kubelet[1454]: I0517 00:41:00.575191 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/89a8ad48-0dd5-49a4-8e14-981634b82dde-kubelet-dir\") pod \"csi-node-driver-959dd\" (UID: \"89a8ad48-0dd5-49a4-8e14-981634b82dde\") " pod="calico-system/csi-node-driver-959dd" May 17 00:41:00.583761 systemd[1]: Created slice kubepods-besteffort-podde8d615a_a13e_4f78_993e_e9b1add13729.slice. May 17 00:41:00.680901 kubelet[1454]: I0517 00:41:00.676247 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/89a8ad48-0dd5-49a4-8e14-981634b82dde-socket-dir\") pod \"csi-node-driver-959dd\" (UID: \"89a8ad48-0dd5-49a4-8e14-981634b82dde\") " pod="calico-system/csi-node-driver-959dd" May 17 00:41:00.680901 kubelet[1454]: I0517 00:41:00.676317 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/de8d615a-a13e-4f78-993e-e9b1add13729-xtables-lock\") pod \"kube-proxy-q4cfq\" (UID: \"de8d615a-a13e-4f78-993e-e9b1add13729\") " pod="kube-system/kube-proxy-q4cfq" May 17 00:41:00.680901 kubelet[1454]: I0517 00:41:00.676438 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/89a8ad48-0dd5-49a4-8e14-981634b82dde-varrun\") pod \"csi-node-driver-959dd\" (UID: \"89a8ad48-0dd5-49a4-8e14-981634b82dde\") " pod="calico-system/csi-node-driver-959dd" May 17 00:41:00.680901 kubelet[1454]: I0517 00:41:00.676464 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/de8d615a-a13e-4f78-993e-e9b1add13729-lib-modules\") pod \"kube-proxy-q4cfq\" (UID: \"de8d615a-a13e-4f78-993e-e9b1add13729\") " pod="kube-system/kube-proxy-q4cfq" May 17 00:41:00.680901 kubelet[1454]: I0517 00:41:00.676539 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-87qvb\" (UniqueName: \"kubernetes.io/projected/89a8ad48-0dd5-49a4-8e14-981634b82dde-kube-api-access-87qvb\") pod \"csi-node-driver-959dd\" (UID: \"89a8ad48-0dd5-49a4-8e14-981634b82dde\") " pod="calico-system/csi-node-driver-959dd" May 17 00:41:00.681283 kubelet[1454]: I0517 00:41:00.676565 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/de8d615a-a13e-4f78-993e-e9b1add13729-kube-proxy\") pod \"kube-proxy-q4cfq\" (UID: \"de8d615a-a13e-4f78-993e-e9b1add13729\") " pod="kube-system/kube-proxy-q4cfq" May 17 00:41:00.681283 kubelet[1454]: I0517 00:41:00.676584 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tj7pb\" (UniqueName: \"kubernetes.io/projected/de8d615a-a13e-4f78-993e-e9b1add13729-kube-api-access-tj7pb\") pod \"kube-proxy-q4cfq\" (UID: \"de8d615a-a13e-4f78-993e-e9b1add13729\") " pod="kube-system/kube-proxy-q4cfq" May 17 00:41:00.681283 kubelet[1454]: I0517 00:41:00.678305 1454 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:41:00.681283 kubelet[1454]: E0517 00:41:00.678525 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.681283 kubelet[1454]: W0517 00:41:00.678552 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.681283 kubelet[1454]: E0517 00:41:00.678592 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.681283 kubelet[1454]: E0517 00:41:00.678833 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.681283 kubelet[1454]: W0517 00:41:00.678860 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.681573 kubelet[1454]: E0517 00:41:00.678873 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.681573 kubelet[1454]: E0517 00:41:00.679031 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.681573 kubelet[1454]: W0517 00:41:00.679042 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.681573 kubelet[1454]: E0517 00:41:00.679051 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.681573 kubelet[1454]: E0517 00:41:00.679235 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.681573 kubelet[1454]: W0517 00:41:00.679245 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.681573 kubelet[1454]: E0517 00:41:00.679255 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.681573 kubelet[1454]: E0517 00:41:00.680489 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.681573 kubelet[1454]: W0517 00:41:00.680505 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.681573 kubelet[1454]: E0517 00:41:00.680520 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.687508 kubelet[1454]: E0517 00:41:00.687466 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.687698 kubelet[1454]: W0517 00:41:00.687670 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.687874 kubelet[1454]: E0517 00:41:00.687849 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.771995 kubelet[1454]: E0517 00:41:00.769714 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.771995 kubelet[1454]: W0517 00:41:00.769764 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.771995 kubelet[1454]: E0517 00:41:00.769796 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.781628 kubelet[1454]: E0517 00:41:00.781455 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.781628 kubelet[1454]: W0517 00:41:00.781492 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.781628 kubelet[1454]: E0517 00:41:00.781518 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.781925 kubelet[1454]: E0517 00:41:00.781832 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.781925 kubelet[1454]: W0517 00:41:00.781855 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.781925 kubelet[1454]: E0517 00:41:00.781866 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.784997 kubelet[1454]: E0517 00:41:00.784572 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.784997 kubelet[1454]: W0517 00:41:00.784615 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.784997 kubelet[1454]: E0517 00:41:00.784646 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.785361 kubelet[1454]: E0517 00:41:00.785304 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.785361 kubelet[1454]: W0517 00:41:00.785323 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.785361 kubelet[1454]: E0517 00:41:00.785336 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.785615 kubelet[1454]: E0517 00:41:00.785540 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.785615 kubelet[1454]: W0517 00:41:00.785549 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.785615 kubelet[1454]: E0517 00:41:00.785559 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.792591 kubelet[1454]: E0517 00:41:00.791932 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.792591 kubelet[1454]: W0517 00:41:00.791973 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.792591 kubelet[1454]: E0517 00:41:00.792014 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.792591 kubelet[1454]: E0517 00:41:00.792350 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.792591 kubelet[1454]: W0517 00:41:00.792363 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.792591 kubelet[1454]: E0517 00:41:00.792374 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.798000 audit[1343]: USER_END pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:00.798000 audit[1343]: CRED_DISP pid=1343 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:41:00.801648 kubelet[1454]: E0517 00:41:00.798987 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.801648 kubelet[1454]: W0517 00:41:00.799027 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.801648 kubelet[1454]: E0517 00:41:00.799359 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.801648 kubelet[1454]: W0517 00:41:00.799371 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.801648 kubelet[1454]: E0517 00:41:00.799546 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.801648 kubelet[1454]: W0517 00:41:00.799558 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.801648 kubelet[1454]: E0517 00:41:00.799722 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.801648 kubelet[1454]: W0517 00:41:00.799756 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.801648 kubelet[1454]: E0517 00:41:00.799946 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.801648 kubelet[1454]: W0517 00:41:00.799960 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.801648 kubelet[1454]: E0517 00:41:00.800142 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.799249 sudo[1343]: pam_unix(sudo:session): session closed for user root May 17 00:41:00.802351 kubelet[1454]: W0517 00:41:00.800153 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.802351 kubelet[1454]: E0517 00:41:00.800321 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.802351 kubelet[1454]: W0517 00:41:00.800333 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.802351 kubelet[1454]: E0517 00:41:00.800351 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.802351 kubelet[1454]: E0517 00:41:00.800546 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.802351 kubelet[1454]: W0517 00:41:00.800560 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.802351 kubelet[1454]: E0517 00:41:00.800573 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.802351 kubelet[1454]: E0517 00:41:00.800761 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.802351 kubelet[1454]: W0517 00:41:00.800772 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.802351 kubelet[1454]: E0517 00:41:00.800783 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.802765 kubelet[1454]: E0517 00:41:00.802716 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.802908 kubelet[1454]: E0517 00:41:00.802888 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.803042 kubelet[1454]: E0517 00:41:00.803022 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.803177 kubelet[1454]: E0517 00:41:00.803157 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.803355 kubelet[1454]: E0517 00:41:00.803335 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.803486 kubelet[1454]: E0517 00:41:00.803466 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.808712 kubelet[1454]: E0517 00:41:00.805565 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.808712 kubelet[1454]: W0517 00:41:00.805588 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.808712 kubelet[1454]: E0517 00:41:00.805607 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.808712 kubelet[1454]: E0517 00:41:00.806486 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.808712 kubelet[1454]: W0517 00:41:00.806498 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.808712 kubelet[1454]: E0517 00:41:00.806509 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.811669 kubelet[1454]: E0517 00:41:00.810871 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.811669 kubelet[1454]: W0517 00:41:00.810894 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.811669 kubelet[1454]: E0517 00:41:00.810923 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.811669 kubelet[1454]: E0517 00:41:00.811216 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.811669 kubelet[1454]: W0517 00:41:00.811228 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.811669 kubelet[1454]: E0517 00:41:00.811466 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.813240 kubelet[1454]: E0517 00:41:00.812563 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.813240 kubelet[1454]: W0517 00:41:00.812576 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.813240 kubelet[1454]: E0517 00:41:00.812684 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.813240 kubelet[1454]: E0517 00:41:00.812826 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.813240 kubelet[1454]: W0517 00:41:00.812852 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.816666 kubelet[1454]: E0517 00:41:00.815347 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.816666 kubelet[1454]: E0517 00:41:00.815495 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.816666 kubelet[1454]: W0517 00:41:00.815510 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.816666 kubelet[1454]: E0517 00:41:00.815714 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.816666 kubelet[1454]: W0517 00:41:00.815725 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.816666 kubelet[1454]: E0517 00:41:00.815917 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.816666 kubelet[1454]: W0517 00:41:00.815928 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.816666 kubelet[1454]: E0517 00:41:00.816106 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.816666 kubelet[1454]: E0517 00:41:00.816126 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.816666 kubelet[1454]: E0517 00:41:00.816139 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.816422 sshd[1339]: pam_unix(sshd:session): session closed for user core May 17 00:41:00.816000 audit[1339]: USER_END pid=1339 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:41:00.816000 audit[1339]: CRED_DISP pid=1339 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:41:00.822265 kubelet[1454]: E0517 00:41:00.821702 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.822265 kubelet[1454]: W0517 00:41:00.821754 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.822265 kubelet[1454]: E0517 00:41:00.821915 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.822964 kubelet[1454]: E0517 00:41:00.822653 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.822964 kubelet[1454]: W0517 00:41:00.822674 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.822964 kubelet[1454]: E0517 00:41:00.822871 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.823651 kubelet[1454]: E0517 00:41:00.823316 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.823651 kubelet[1454]: W0517 00:41:00.823334 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.823651 kubelet[1454]: E0517 00:41:00.823455 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.824966 kubelet[1454]: E0517 00:41:00.824873 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.824966 kubelet[1454]: W0517 00:41:00.824897 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.827189 kubelet[1454]: E0517 00:41:00.826879 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.827189 kubelet[1454]: W0517 00:41:00.826902 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.827189 kubelet[1454]: E0517 00:41:00.827072 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.827189 kubelet[1454]: E0517 00:41:00.827124 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.828641 systemd[1]: sshd@6-10.0.0.142:22-10.0.0.1:38876.service: Deactivated successfully. May 17 00:41:00.829597 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:41:00.830897 systemd-logind[1194]: Session 7 logged out. Waiting for processes to exit. May 17 00:41:00.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.142:22-10.0.0.1:38876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.833252 kubelet[1454]: E0517 00:41:00.832790 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.833252 kubelet[1454]: W0517 00:41:00.832818 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.833252 kubelet[1454]: E0517 00:41:00.833019 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.834508 kubelet[1454]: E0517 00:41:00.833891 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.834508 kubelet[1454]: W0517 00:41:00.833907 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.834508 kubelet[1454]: E0517 00:41:00.834051 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.835061 kubelet[1454]: E0517 00:41:00.834775 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.835061 kubelet[1454]: W0517 00:41:00.834792 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.835061 kubelet[1454]: E0517 00:41:00.834929 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.835710 kubelet[1454]: E0517 00:41:00.835506 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.835710 kubelet[1454]: W0517 00:41:00.835526 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.835710 kubelet[1454]: E0517 00:41:00.835649 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.836500 kubelet[1454]: E0517 00:41:00.836349 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.836500 kubelet[1454]: W0517 00:41:00.836368 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.836659 kubelet[1454]: E0517 00:41:00.836634 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.838376 kubelet[1454]: E0517 00:41:00.838057 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.838376 kubelet[1454]: W0517 00:41:00.838075 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.838376 kubelet[1454]: E0517 00:41:00.838091 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.842830 systemd-logind[1194]: Removed session 7. May 17 00:41:00.880781 kubelet[1454]: E0517 00:41:00.873252 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.880781 kubelet[1454]: W0517 00:41:00.873292 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.880781 kubelet[1454]: E0517 00:41:00.873325 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.881029 env[1209]: time="2025-05-17T00:41:00.879286932Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-cs6n6,Uid:6a6c4b20-86c1-4942-b2b8-b46cb033fb6a,Namespace:calico-system,Attempt:0,}" May 17 00:41:00.886183 kubelet[1454]: E0517 00:41:00.886009 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:41:00.886183 kubelet[1454]: W0517 00:41:00.886035 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:41:00.886183 kubelet[1454]: E0517 00:41:00.886062 1454 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:41:00.898953 kubelet[1454]: E0517 00:41:00.898885 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:41:00.899651 env[1209]: time="2025-05-17T00:41:00.899602569Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-q4cfq,Uid:de8d615a-a13e-4f78-993e-e9b1add13729,Namespace:kube-system,Attempt:0,}" May 17 00:41:01.524009 kubelet[1454]: E0517 00:41:01.523923 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:02.008385 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3753527796.mount: Deactivated successfully. May 17 00:41:02.045656 env[1209]: time="2025-05-17T00:41:02.043120622Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:02.049659 env[1209]: time="2025-05-17T00:41:02.049567935Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:02.072791 env[1209]: time="2025-05-17T00:41:02.068577231Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:02.080064 env[1209]: time="2025-05-17T00:41:02.079982053Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:02.093940 env[1209]: time="2025-05-17T00:41:02.087036495Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:02.098867 env[1209]: time="2025-05-17T00:41:02.096847829Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:02.106975 env[1209]: time="2025-05-17T00:41:02.105704090Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:02.122765 env[1209]: time="2025-05-17T00:41:02.122558745Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:02.235949 kubelet[1454]: E0517 00:41:02.231123 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-959dd" podUID="89a8ad48-0dd5-49a4-8e14-981634b82dde" May 17 00:41:02.355023 env[1209]: time="2025-05-17T00:41:02.350970951Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:41:02.355023 env[1209]: time="2025-05-17T00:41:02.351047374Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:41:02.355023 env[1209]: time="2025-05-17T00:41:02.351064486Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:41:02.355023 env[1209]: time="2025-05-17T00:41:02.351317952Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f60dc344c9f9cc1b7698ea33657c6bc86068f4c892623b7dc872cfc9bc410179 pid=1558 runtime=io.containerd.runc.v2 May 17 00:41:02.379945 env[1209]: time="2025-05-17T00:41:02.379825634Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:41:02.380309 env[1209]: time="2025-05-17T00:41:02.380268234Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:41:02.380447 env[1209]: time="2025-05-17T00:41:02.380413026Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:41:02.380927 env[1209]: time="2025-05-17T00:41:02.380873459Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7b8e5a71a8108db7d6f7cf0152f0eb588064b7e887015840875369d94f3977ba pid=1580 runtime=io.containerd.runc.v2 May 17 00:41:02.400539 systemd[1]: Started cri-containerd-f60dc344c9f9cc1b7698ea33657c6bc86068f4c892623b7dc872cfc9bc410179.scope. May 17 00:41:02.410034 systemd[1]: Started cri-containerd-7b8e5a71a8108db7d6f7cf0152f0eb588064b7e887015840875369d94f3977ba.scope. May 17 00:41:02.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.440396 kernel: kauditd_printk_skb: 243 callbacks suppressed May 17 00:41:02.440583 kernel: audit: type=1400 audit(1747442462.433:398): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.440625 kernel: audit: type=1400 audit(1747442462.433:399): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.444588 kernel: audit: type=1400 audit(1747442462.435:400): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.455416 kernel: audit: type=1400 audit(1747442462.435:401): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.459614 kernel: audit: type=1400 audit(1747442462.435:402): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.464900 kernel: audit: type=1400 audit(1747442462.435:403): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.495808 kernel: audit: type=1400 audit(1747442462.435:404): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.495972 kernel: audit: type=1400 audit(1747442462.435:405): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.496036 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:41:02.498099 kernel: audit: type=1400 audit(1747442462.435:406): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.444000 audit: BPF prog-id=55 op=LOAD May 17 00:41:02.448000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.448000 audit[1568]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1558 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:02.448000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636306463333434633966396363316237363938656133333635376336 May 17 00:41:02.448000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.448000 audit[1568]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1558 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:02.448000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636306463333434633966396363316237363938656133333635376336 May 17 00:41:02.448000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.448000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.448000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.448000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.448000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.448000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.448000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.448000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.448000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.448000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.448000 audit: BPF prog-id=56 op=LOAD May 17 00:41:02.448000 audit[1568]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000268190 items=0 ppid=1558 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:02.448000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636306463333434633966396363316237363938656133333635376336 May 17 00:41:02.464000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.464000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.464000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.464000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.464000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.464000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.464000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.464000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.493000 audit: BPF prog-id=57 op=LOAD May 17 00:41:02.464000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.464000 audit: BPF prog-id=58 op=LOAD May 17 00:41:02.464000 audit[1568]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002681d8 items=0 ppid=1558 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:02.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636306463333434633966396363316237363938656133333635376336 May 17 00:41:02.494000 audit: BPF prog-id=58 op=UNLOAD May 17 00:41:02.494000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.494000 audit[1595]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1580 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:02.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762386535613731613831303864623764366637636630313532663065 May 17 00:41:02.494000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.494000 audit[1595]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1580 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:02.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762386535613731613831303864623764366637636630313532663065 May 17 00:41:02.494000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.494000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.494000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.494000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.494000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.494000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.494000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.496000 audit: BPF prog-id=56 op=UNLOAD May 17 00:41:02.494000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.494000 audit: BPF prog-id=59 op=LOAD May 17 00:41:02.494000 audit[1595]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00015f150 items=0 ppid=1580 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:02.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762386535613731613831303864623764366637636630313532663065 May 17 00:41:02.503000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.503000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.503000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.503000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.503000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.503000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.503000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.503000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.503000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.503000 audit: BPF prog-id=60 op=LOAD May 17 00:41:02.496000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.496000 audit: BPF prog-id=61 op=LOAD May 17 00:41:02.503000 audit[1595]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00015f198 items=0 ppid=1580 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:02.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762386535613731613831303864623764366637636630313532663065 May 17 00:41:02.503000 audit: BPF prog-id=60 op=UNLOAD May 17 00:41:02.496000 audit[1568]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002685e8 items=0 ppid=1558 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:02.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636306463333434633966396363316237363938656133333635376336 May 17 00:41:02.503000 audit: BPF prog-id=59 op=UNLOAD May 17 00:41:02.503000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.503000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.503000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.503000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.503000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.503000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.503000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.503000 audit[1595]: AVC avc: denied { perfmon } for pid=1595 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.503000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.503000 audit[1595]: AVC avc: denied { bpf } for pid=1595 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:02.503000 audit: BPF prog-id=62 op=LOAD May 17 00:41:02.503000 audit[1595]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00015f5a8 items=0 ppid=1580 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:02.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762386535613731613831303864623764366637636630313532663065 May 17 00:41:02.525020 kubelet[1454]: E0517 00:41:02.524563 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:02.532920 env[1209]: time="2025-05-17T00:41:02.530504835Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-cs6n6,Uid:6a6c4b20-86c1-4942-b2b8-b46cb033fb6a,Namespace:calico-system,Attempt:0,} returns sandbox id \"7b8e5a71a8108db7d6f7cf0152f0eb588064b7e887015840875369d94f3977ba\"" May 17 00:41:02.534014 env[1209]: time="2025-05-17T00:41:02.533951210Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:41:02.545609 env[1209]: time="2025-05-17T00:41:02.545509880Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-q4cfq,Uid:de8d615a-a13e-4f78-993e-e9b1add13729,Namespace:kube-system,Attempt:0,} returns sandbox id \"f60dc344c9f9cc1b7698ea33657c6bc86068f4c892623b7dc872cfc9bc410179\"" May 17 00:41:02.546805 kubelet[1454]: E0517 00:41:02.546659 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:41:03.525617 kubelet[1454]: E0517 00:41:03.525491 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:04.226724 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1289346588.mount: Deactivated successfully. May 17 00:41:04.233190 kubelet[1454]: E0517 00:41:04.233109 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-959dd" podUID="89a8ad48-0dd5-49a4-8e14-981634b82dde" May 17 00:41:04.457398 env[1209]: time="2025-05-17T00:41:04.457320180Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:04.461627 env[1209]: time="2025-05-17T00:41:04.461436040Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:04.463596 env[1209]: time="2025-05-17T00:41:04.463523355Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:04.465711 env[1209]: time="2025-05-17T00:41:04.465628604Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:04.466357 env[1209]: time="2025-05-17T00:41:04.466282501Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 00:41:04.471522 env[1209]: time="2025-05-17T00:41:04.468576594Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.5\"" May 17 00:41:04.474047 env[1209]: time="2025-05-17T00:41:04.472128747Z" level=info msg="CreateContainer within sandbox \"7b8e5a71a8108db7d6f7cf0152f0eb588064b7e887015840875369d94f3977ba\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:41:04.515714 env[1209]: time="2025-05-17T00:41:04.515501231Z" level=info msg="CreateContainer within sandbox \"7b8e5a71a8108db7d6f7cf0152f0eb588064b7e887015840875369d94f3977ba\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"3813aebb9c1604faf27f1a89ba35508942a919f78e705bee16075aab54f4aaf4\"" May 17 00:41:04.516439 env[1209]: time="2025-05-17T00:41:04.516374198Z" level=info msg="StartContainer for \"3813aebb9c1604faf27f1a89ba35508942a919f78e705bee16075aab54f4aaf4\"" May 17 00:41:04.526110 kubelet[1454]: E0517 00:41:04.526053 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:04.551955 systemd[1]: Started cri-containerd-3813aebb9c1604faf27f1a89ba35508942a919f78e705bee16075aab54f4aaf4.scope. May 17 00:41:04.587000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.587000 audit[1639]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c76b0 a2=3c a3=7f1e371552a8 items=0 ppid=1580 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:04.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338313361656262396331363034666166323766316138396261333535 May 17 00:41:04.587000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.587000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.587000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.587000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.587000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.587000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.587000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.587000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.587000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.587000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.587000 audit: BPF prog-id=63 op=LOAD May 17 00:41:04.587000 audit[1639]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c79d8 a2=78 a3=c000110be8 items=0 ppid=1580 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:04.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338313361656262396331363034666166323766316138396261333535 May 17 00:41:04.588000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.588000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.588000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.588000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.588000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.588000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.588000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.588000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.588000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.588000 audit: BPF prog-id=64 op=LOAD May 17 00:41:04.588000 audit[1639]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c7770 a2=78 a3=c000110c38 items=0 ppid=1580 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:04.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338313361656262396331363034666166323766316138396261333535 May 17 00:41:04.588000 audit: BPF prog-id=64 op=UNLOAD May 17 00:41:04.588000 audit: BPF prog-id=63 op=UNLOAD May 17 00:41:04.588000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.588000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.588000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.588000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.588000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.588000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.588000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.588000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.588000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.588000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:04.588000 audit: BPF prog-id=65 op=LOAD May 17 00:41:04.588000 audit[1639]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c7c30 a2=78 a3=c000110cc8 items=0 ppid=1580 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:04.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338313361656262396331363034666166323766316138396261333535 May 17 00:41:04.638117 env[1209]: time="2025-05-17T00:41:04.637988372Z" level=info msg="StartContainer for \"3813aebb9c1604faf27f1a89ba35508942a919f78e705bee16075aab54f4aaf4\" returns successfully" May 17 00:41:04.643256 systemd[1]: cri-containerd-3813aebb9c1604faf27f1a89ba35508942a919f78e705bee16075aab54f4aaf4.scope: Deactivated successfully. May 17 00:41:04.656000 audit: BPF prog-id=65 op=UNLOAD May 17 00:41:04.787483 env[1209]: time="2025-05-17T00:41:04.786777668Z" level=info msg="shim disconnected" id=3813aebb9c1604faf27f1a89ba35508942a919f78e705bee16075aab54f4aaf4 May 17 00:41:04.787483 env[1209]: time="2025-05-17T00:41:04.786991068Z" level=warning msg="cleaning up after shim disconnected" id=3813aebb9c1604faf27f1a89ba35508942a919f78e705bee16075aab54f4aaf4 namespace=k8s.io May 17 00:41:04.788065 env[1209]: time="2025-05-17T00:41:04.787924289Z" level=info msg="cleaning up dead shim" May 17 00:41:04.816967 env[1209]: time="2025-05-17T00:41:04.816172915Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:41:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1676 runtime=io.containerd.runc.v2\n" May 17 00:41:05.150721 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3813aebb9c1604faf27f1a89ba35508942a919f78e705bee16075aab54f4aaf4-rootfs.mount: Deactivated successfully. May 17 00:41:05.527422 kubelet[1454]: E0517 00:41:05.527079 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:06.205376 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1356633746.mount: Deactivated successfully. May 17 00:41:06.230728 kubelet[1454]: E0517 00:41:06.229662 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-959dd" podUID="89a8ad48-0dd5-49a4-8e14-981634b82dde" May 17 00:41:06.528253 kubelet[1454]: E0517 00:41:06.528063 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:07.201777 env[1209]: time="2025-05-17T00:41:07.201692177Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:07.215327 env[1209]: time="2025-05-17T00:41:07.215261169Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:07.218279 env[1209]: time="2025-05-17T00:41:07.218239676Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:07.221378 env[1209]: time="2025-05-17T00:41:07.221313491Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9dc6553459c3319525ba4090a780db1a133d5dee68c08e07f9b9d6ba83b42a0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:07.221883 env[1209]: time="2025-05-17T00:41:07.221851921Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.5\" returns image reference \"sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363\"" May 17 00:41:07.225200 env[1209]: time="2025-05-17T00:41:07.225149066Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:41:07.231422 env[1209]: time="2025-05-17T00:41:07.231343375Z" level=info msg="CreateContainer within sandbox \"f60dc344c9f9cc1b7698ea33657c6bc86068f4c892623b7dc872cfc9bc410179\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:41:07.292250 env[1209]: time="2025-05-17T00:41:07.292140573Z" level=info msg="CreateContainer within sandbox \"f60dc344c9f9cc1b7698ea33657c6bc86068f4c892623b7dc872cfc9bc410179\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"5b31e69c8142453ec91374bcc7b318f4ceb67deb0f29f0856098927c8c15938e\"" May 17 00:41:07.292849 env[1209]: time="2025-05-17T00:41:07.292805109Z" level=info msg="StartContainer for \"5b31e69c8142453ec91374bcc7b318f4ceb67deb0f29f0856098927c8c15938e\"" May 17 00:41:07.338279 systemd[1]: run-containerd-runc-k8s.io-5b31e69c8142453ec91374bcc7b318f4ceb67deb0f29f0856098927c8c15938e-runc.gOSWmv.mount: Deactivated successfully. May 17 00:41:07.353721 systemd[1]: Started cri-containerd-5b31e69c8142453ec91374bcc7b318f4ceb67deb0f29f0856098927c8c15938e.scope. May 17 00:41:07.388000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.388000 audit[1700]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=7ffb0b5432f8 items=0 ppid=1558 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333165363963383134323435336563393133373462636337623331 May 17 00:41:07.388000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.388000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.388000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.388000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.388000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.388000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.388000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.388000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.388000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.388000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.388000 audit: BPF prog-id=66 op=LOAD May 17 00:41:07.388000 audit[1700]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bf9d8 a2=78 a3=c000024b48 items=0 ppid=1558 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333165363963383134323435336563393133373462636337623331 May 17 00:41:07.388000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.388000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.388000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.388000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.388000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.388000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.388000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.388000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.388000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.388000 audit: BPF prog-id=67 op=LOAD May 17 00:41:07.388000 audit[1700]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bf770 a2=78 a3=c000024b98 items=0 ppid=1558 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333165363963383134323435336563393133373462636337623331 May 17 00:41:07.389000 audit: BPF prog-id=67 op=UNLOAD May 17 00:41:07.389000 audit: BPF prog-id=66 op=UNLOAD May 17 00:41:07.389000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.389000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.389000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.389000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.389000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.389000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.389000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.389000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.389000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.389000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:07.389000 audit: BPF prog-id=68 op=LOAD May 17 00:41:07.389000 audit[1700]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bfc30 a2=78 a3=c000024c28 items=0 ppid=1558 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333165363963383134323435336563393133373462636337623331 May 17 00:41:07.421111 env[1209]: time="2025-05-17T00:41:07.421030423Z" level=info msg="StartContainer for \"5b31e69c8142453ec91374bcc7b318f4ceb67deb0f29f0856098927c8c15938e\" returns successfully" May 17 00:41:07.536989 kubelet[1454]: E0517 00:41:07.528901 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:07.778000 audit[1760]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:07.782329 kernel: kauditd_printk_skb: 213 callbacks suppressed May 17 00:41:07.782660 kernel: audit: type=1325 audit(1747442467.778:447): table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:07.778000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdad453d30 a2=0 a3=7ffdad453d1c items=0 ppid=1710 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.795700 kernel: audit: type=1300 audit(1747442467.778:447): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdad453d30 a2=0 a3=7ffdad453d1c items=0 ppid=1710 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.778000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:41:07.779000 audit[1759]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:07.803308 kernel: audit: type=1327 audit(1747442467.778:447): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:41:07.803421 kernel: audit: type=1325 audit(1747442467.779:448): table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:07.803460 kernel: audit: type=1300 audit(1747442467.779:448): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe945b39c0 a2=0 a3=7ffe945b39ac items=0 ppid=1710 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.779000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe945b39c0 a2=0 a3=7ffe945b39ac items=0 ppid=1710 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.779000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:41:07.816971 kernel: audit: type=1327 audit(1747442467.779:448): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:41:07.839749 kernel: audit: type=1325 audit(1747442467.779:449): table=nat:16 family=10 entries=1 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:07.839918 kernel: audit: type=1300 audit(1747442467.779:449): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1e05c0c0 a2=0 a3=7ffc1e05c0ac items=0 ppid=1710 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.779000 audit[1761]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:07.779000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1e05c0c0 a2=0 a3=7ffc1e05c0ac items=0 ppid=1710 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.846454 kernel: audit: type=1327 audit(1747442467.779:449): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:41:07.779000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:41:07.849854 kernel: audit: type=1325 audit(1747442467.783:450): table=filter:17 family=10 entries=1 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:07.783000 audit[1763]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:07.783000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6138cd80 a2=0 a3=7ffd6138cd6c items=0 ppid=1710 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.783000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:41:07.788000 audit[1762]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:07.788000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe57637550 a2=0 a3=7ffe5763753c items=0 ppid=1710 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.788000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:41:07.792000 audit[1764]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:07.792000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe2bec6b0 a2=0 a3=7fffe2bec69c items=0 ppid=1710 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.792000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:41:07.881000 audit[1765]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:07.881000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc34ab5200 a2=0 a3=7ffc34ab51ec items=0 ppid=1710 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.881000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:41:07.887000 audit[1767]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:07.887000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff4b6061b0 a2=0 a3=7fff4b60619c items=0 ppid=1710 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.887000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:41:07.894000 audit[1770]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:07.894000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe18f55cc0 a2=0 a3=7ffe18f55cac items=0 ppid=1710 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.894000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:41:07.902000 audit[1771]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:07.902000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc90525e40 a2=0 a3=7ffc90525e2c items=0 ppid=1710 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.902000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:41:07.912000 audit[1773]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:07.912000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffdd0b2230 a2=0 a3=7fffdd0b221c items=0 ppid=1710 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.912000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:41:07.913000 audit[1774]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:07.913000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd06a5070 a2=0 a3=7fffd06a505c items=0 ppid=1710 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.913000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:41:07.922000 audit[1776]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:07.922000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffee4e697f0 a2=0 a3=7ffee4e697dc items=0 ppid=1710 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.922000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:41:07.936000 audit[1779]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:07.936000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff87a7f150 a2=0 a3=7fff87a7f13c items=0 ppid=1710 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.936000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:41:07.940000 audit[1780]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:07.940000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2dee58d0 a2=0 a3=7ffc2dee58bc items=0 ppid=1710 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.940000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:41:07.942000 audit[1782]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:07.942000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd790b7e00 a2=0 a3=7ffd790b7dec items=0 ppid=1710 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.942000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:41:07.951000 audit[1783]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:07.951000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda3eb58d0 a2=0 a3=7ffda3eb58bc items=0 ppid=1710 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.951000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:41:07.954000 audit[1785]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1785 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:07.954000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe3fa41fc0 a2=0 a3=7ffe3fa41fac items=0 ppid=1710 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.954000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:41:07.978000 audit[1788]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:07.978000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeec7175e0 a2=0 a3=7ffeec7175cc items=0 ppid=1710 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.978000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:41:07.992000 audit[1792]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:07.992000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc14753f0 a2=0 a3=7ffdc14753dc items=0 ppid=1710 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.992000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:41:07.996000 audit[1793]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1793 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:07.996000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffcb9559c0 a2=0 a3=7fffcb9559ac items=0 ppid=1710 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:07.996000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:41:08.000000 audit[1795]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:08.000000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe7b997930 a2=0 a3=7ffe7b99791c items=0 ppid=1710 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.000000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:41:08.037000 audit[1799]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:08.037000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc39054a10 a2=0 a3=7ffc390549fc items=0 ppid=1710 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.037000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:41:08.038000 audit[1800]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:08.038000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf72a3ea0 a2=0 a3=7ffcf72a3e8c items=0 ppid=1710 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.038000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:41:08.040000 audit[1802]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1802 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:41:08.040000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe16fa3830 a2=0 a3=7ffe16fa381c items=0 ppid=1710 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.040000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:41:08.095000 audit[1808]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=1808 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:08.095000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffccace6880 a2=0 a3=7ffccace686c items=0 ppid=1710 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.095000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:08.165000 audit[1808]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:08.165000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=25476 a0=3 a1=7ffccace6880 a2=0 a3=7ffccace686c items=0 ppid=1710 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.165000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:08.213000 audit[1817]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1817 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:08.213000 audit[1817]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffec3527d30 a2=0 a3=7ffec3527d1c items=0 ppid=1710 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.213000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:41:08.237193 kubelet[1454]: E0517 00:41:08.237019 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-959dd" podUID="89a8ad48-0dd5-49a4-8e14-981634b82dde" May 17 00:41:08.237000 audit[1819]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1819 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:08.237000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe8ef0ac50 a2=0 a3=7ffe8ef0ac3c items=0 ppid=1710 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.237000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:41:08.276000 audit[1822]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1822 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:08.276000 audit[1822]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd560f7310 a2=0 a3=7ffd560f72fc items=0 ppid=1710 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.276000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:41:08.276000 audit[1823]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:08.276000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff82df7a50 a2=0 a3=7fff82df7a3c items=0 ppid=1710 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.276000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:41:08.285000 audit[1825]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1825 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:08.285000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe23bc7f60 a2=0 a3=7ffe23bc7f4c items=0 ppid=1710 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.285000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:41:08.295000 audit[1826]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1826 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:08.295000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0ae164c0 a2=0 a3=7ffe0ae164ac items=0 ppid=1710 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.295000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:41:08.306000 audit[1828]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1828 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:08.306000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe06b22da0 a2=0 a3=7ffe06b22d8c items=0 ppid=1710 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:41:08.330000 audit[1831]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1831 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:08.330000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffbfddc2f0 a2=0 a3=7fffbfddc2dc items=0 ppid=1710 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.330000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:41:08.333000 audit[1832]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:08.333000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcda8de630 a2=0 a3=7ffcda8de61c items=0 ppid=1710 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.333000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:41:08.337000 audit[1834]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:08.337000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff4a0c36e0 a2=0 a3=7fff4a0c36cc items=0 ppid=1710 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.337000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:41:08.345000 audit[1835]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1835 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:08.345000 audit[1835]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcbae74f80 a2=0 a3=7ffcbae74f6c items=0 ppid=1710 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.345000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:41:08.360716 kubelet[1454]: E0517 00:41:08.344594 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:41:08.363000 audit[1837]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1837 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:08.363000 audit[1837]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff1cc67d30 a2=0 a3=7fff1cc67d1c items=0 ppid=1710 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.363000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:41:08.383000 audit[1840]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1840 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:08.383000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff561f1b10 a2=0 a3=7fff561f1afc items=0 ppid=1710 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.383000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:41:08.392000 audit[1843]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1843 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:08.392000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffef5243750 a2=0 a3=7ffef524373c items=0 ppid=1710 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.392000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:41:08.394000 audit[1844]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1844 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:08.394000 audit[1844]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd60b328c0 a2=0 a3=7ffd60b328ac items=0 ppid=1710 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.394000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:41:08.397000 audit[1846]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1846 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:08.397000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdd053e5a0 a2=0 a3=7ffdd053e58c items=0 ppid=1710 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.397000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:41:08.411000 audit[1849]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1849 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:08.411000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd12a1b250 a2=0 a3=7ffd12a1b23c items=0 ppid=1710 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.411000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:41:08.411000 audit[1850]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1850 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:08.411000 audit[1850]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe96eb55b0 a2=0 a3=7ffe96eb559c items=0 ppid=1710 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.411000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:41:08.416000 audit[1852]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1852 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:08.416000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe8d844e90 a2=0 a3=7ffe8d844e7c items=0 ppid=1710 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.416000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:41:08.421000 audit[1853]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1853 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:08.421000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee6d92350 a2=0 a3=7ffee6d9233c items=0 ppid=1710 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.421000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:41:08.421000 audit[1855]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1855 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:08.421000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc87aebfe0 a2=0 a3=7ffc87aebfcc items=0 ppid=1710 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.421000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:41:08.437000 audit[1858]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1858 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:41:08.437000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd3e3051b0 a2=0 a3=7ffd3e30519c items=0 ppid=1710 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.437000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:41:08.445000 audit[1860]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1860 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:41:08.445000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff5964cbd0 a2=0 a3=7fff5964cbbc items=0 ppid=1710 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.445000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:08.445000 audit[1860]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1860 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:41:08.445000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff5964cbd0 a2=0 a3=7fff5964cbbc items=0 ppid=1710 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:08.445000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:08.537880 kubelet[1454]: E0517 00:41:08.531754 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:09.346996 kubelet[1454]: E0517 00:41:09.346693 1454 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:41:09.532463 kubelet[1454]: E0517 00:41:09.532338 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:10.230717 kubelet[1454]: E0517 00:41:10.230283 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-959dd" podUID="89a8ad48-0dd5-49a4-8e14-981634b82dde" May 17 00:41:10.533157 kubelet[1454]: E0517 00:41:10.532946 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:10.876000 audit[1862]: NETFILTER_CFG table=filter:65 family=2 entries=13 op=nft_register_rule pid=1862 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:10.876000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd1025fbb0 a2=0 a3=7ffd1025fb9c items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.876000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:10.885000 audit[1862]: NETFILTER_CFG table=nat:66 family=2 entries=27 op=nft_register_chain pid=1862 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:10.885000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd1025fbb0 a2=0 a3=7ffd1025fb9c items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.885000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:11.545224 kubelet[1454]: E0517 00:41:11.545157 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:11.658000 audit[1864]: NETFILTER_CFG table=filter:67 family=2 entries=12 op=nft_register_rule pid=1864 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:11.658000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffec0f4f8e0 a2=0 a3=7ffec0f4f8cc items=0 ppid=1710 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:11.658000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:11.684000 audit[1864]: NETFILTER_CFG table=nat:68 family=2 entries=30 op=nft_register_rule pid=1864 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:11.684000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffec0f4f8e0 a2=0 a3=7ffec0f4f8cc items=0 ppid=1710 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:11.684000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:12.231059 kubelet[1454]: E0517 00:41:12.230252 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-959dd" podUID="89a8ad48-0dd5-49a4-8e14-981634b82dde" May 17 00:41:12.549634 kubelet[1454]: E0517 00:41:12.546168 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:13.420918 env[1209]: time="2025-05-17T00:41:13.418966848Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:13.424455 env[1209]: time="2025-05-17T00:41:13.424408364Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:13.429160 env[1209]: time="2025-05-17T00:41:13.428201810Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:13.434105 env[1209]: time="2025-05-17T00:41:13.433123301Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:13.438107 env[1209]: time="2025-05-17T00:41:13.437048654Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 00:41:13.442618 env[1209]: time="2025-05-17T00:41:13.440966853Z" level=info msg="CreateContainer within sandbox \"7b8e5a71a8108db7d6f7cf0152f0eb588064b7e887015840875369d94f3977ba\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:41:13.495099 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1251401722.mount: Deactivated successfully. May 17 00:41:13.511900 env[1209]: time="2025-05-17T00:41:13.510104366Z" level=info msg="CreateContainer within sandbox \"7b8e5a71a8108db7d6f7cf0152f0eb588064b7e887015840875369d94f3977ba\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7474b2252b921fd971db25974454de214cbe0b48e17c58eaab1ec0fe7f8c311f\"" May 17 00:41:13.515673 env[1209]: time="2025-05-17T00:41:13.512550093Z" level=info msg="StartContainer for \"7474b2252b921fd971db25974454de214cbe0b48e17c58eaab1ec0fe7f8c311f\"" May 17 00:41:13.559446 kubelet[1454]: E0517 00:41:13.555378 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:13.592035 systemd[1]: Started cri-containerd-7474b2252b921fd971db25974454de214cbe0b48e17c58eaab1ec0fe7f8c311f.scope. May 17 00:41:13.629568 kernel: kauditd_printk_skb: 155 callbacks suppressed May 17 00:41:13.629724 kernel: audit: type=1400 audit(1747442473.625:502): avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.625000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.625000 audit[1872]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f0f969e0128 items=0 ppid=1580 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.650860 kernel: audit: type=1300 audit(1747442473.625:502): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f0f969e0128 items=0 ppid=1580 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.651023 kernel: audit: type=1327 audit(1747442473.625:502): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734373462323235326239323166643937316462323539373434353464 May 17 00:41:13.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734373462323235326239323166643937316462323539373434353464 May 17 00:41:13.660686 kernel: audit: type=1400 audit(1747442473.629:503): avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.629000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.668882 kernel: audit: type=1400 audit(1747442473.629:503): avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.629000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.677361 kernel: audit: type=1400 audit(1747442473.629:503): avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.629000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.683546 kernel: audit: type=1400 audit(1747442473.629:503): avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.629000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.687506 kernel: audit: type=1400 audit(1747442473.629:503): avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.629000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.693565 kernel: audit: type=1400 audit(1747442473.629:503): avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.629000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.697656 kernel: audit: type=1400 audit(1747442473.629:503): avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.629000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.629000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.629000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.629000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.629000 audit: BPF prog-id=69 op=LOAD May 17 00:41:13.629000 audit[1872]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c000298b08 items=0 ppid=1580 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734373462323235326239323166643937316462323539373434353464 May 17 00:41:13.660000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.660000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.660000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.660000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.660000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.660000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.660000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.660000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.660000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.660000 audit: BPF prog-id=70 op=LOAD May 17 00:41:13.660000 audit[1872]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c000298b58 items=0 ppid=1580 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734373462323235326239323166643937316462323539373434353464 May 17 00:41:13.683000 audit: BPF prog-id=70 op=UNLOAD May 17 00:41:13.683000 audit: BPF prog-id=69 op=UNLOAD May 17 00:41:13.683000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.683000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.683000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.683000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.683000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.683000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.683000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.683000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.683000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.683000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:13.683000 audit: BPF prog-id=71 op=LOAD May 17 00:41:13.683000 audit[1872]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c000298be8 items=0 ppid=1580 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:13.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734373462323235326239323166643937316462323539373434353464 May 17 00:41:13.774689 env[1209]: time="2025-05-17T00:41:13.774577161Z" level=info msg="StartContainer for \"7474b2252b921fd971db25974454de214cbe0b48e17c58eaab1ec0fe7f8c311f\" returns successfully" May 17 00:41:14.233375 kubelet[1454]: E0517 00:41:14.232969 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-959dd" podUID="89a8ad48-0dd5-49a4-8e14-981634b82dde" May 17 00:41:14.545794 kubelet[1454]: I0517 00:41:14.545570 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-q4cfq" podStartSLOduration=9.868682168 podStartE2EDuration="14.545547591s" podCreationTimestamp="2025-05-17 00:41:00 +0000 UTC" firstStartedPulling="2025-05-17 00:41:02.547304687 +0000 UTC m=+3.847507075" lastFinishedPulling="2025-05-17 00:41:07.22417012 +0000 UTC m=+8.524372498" observedRunningTime="2025-05-17 00:41:08.442347202 +0000 UTC m=+9.742549590" watchObservedRunningTime="2025-05-17 00:41:14.545547591 +0000 UTC m=+15.845749979" May 17 00:41:14.559035 kubelet[1454]: E0517 00:41:14.558706 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:14.559000 audit[1901]: NETFILTER_CFG table=filter:69 family=2 entries=12 op=nft_register_rule pid=1901 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:14.559000 audit[1901]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff85373bc0 a2=0 a3=7fff85373bac items=0 ppid=1710 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:14.559000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:14.566000 audit[1901]: NETFILTER_CFG table=nat:70 family=2 entries=34 op=nft_register_chain pid=1901 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:14.566000 audit[1901]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff85373bc0 a2=0 a3=7fff85373bac items=0 ppid=1710 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:14.566000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:15.249916 kubelet[1454]: E0517 00:41:15.247047 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-959dd" podUID="89a8ad48-0dd5-49a4-8e14-981634b82dde" May 17 00:41:15.560039 kubelet[1454]: E0517 00:41:15.559795 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:15.776654 env[1209]: time="2025-05-17T00:41:15.776030235Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:41:15.778891 systemd[1]: cri-containerd-7474b2252b921fd971db25974454de214cbe0b48e17c58eaab1ec0fe7f8c311f.scope: Deactivated successfully. May 17 00:41:15.784000 audit: BPF prog-id=71 op=UNLOAD May 17 00:41:15.814624 kubelet[1454]: I0517 00:41:15.806132 1454 kubelet_node_status.go:501] "Fast updating node status as it just became ready" May 17 00:41:15.875001 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7474b2252b921fd971db25974454de214cbe0b48e17c58eaab1ec0fe7f8c311f-rootfs.mount: Deactivated successfully. May 17 00:41:16.561786 kubelet[1454]: E0517 00:41:16.560696 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:17.268676 env[1209]: time="2025-05-17T00:41:17.267363369Z" level=info msg="shim disconnected" id=7474b2252b921fd971db25974454de214cbe0b48e17c58eaab1ec0fe7f8c311f May 17 00:41:17.268676 env[1209]: time="2025-05-17T00:41:17.267430155Z" level=warning msg="cleaning up after shim disconnected" id=7474b2252b921fd971db25974454de214cbe0b48e17c58eaab1ec0fe7f8c311f namespace=k8s.io May 17 00:41:17.268676 env[1209]: time="2025-05-17T00:41:17.267443600Z" level=info msg="cleaning up dead shim" May 17 00:41:17.268918 systemd[1]: Created slice kubepods-besteffort-pod89a8ad48_0dd5_49a4_8e14_981634b82dde.slice. May 17 00:41:17.276693 env[1209]: time="2025-05-17T00:41:17.275242308Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-959dd,Uid:89a8ad48-0dd5-49a4-8e14-981634b82dde,Namespace:calico-system,Attempt:0,}" May 17 00:41:17.307485 env[1209]: time="2025-05-17T00:41:17.306781777Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:41:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1916 runtime=io.containerd.runc.v2\n" May 17 00:41:17.409105 env[1209]: time="2025-05-17T00:41:17.409051255Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:41:17.563656 kubelet[1454]: E0517 00:41:17.563001 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:17.593396 env[1209]: time="2025-05-17T00:41:17.592121443Z" level=error msg="Failed to destroy network for sandbox \"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:41:17.598400 env[1209]: time="2025-05-17T00:41:17.594240828Z" level=error msg="encountered an error cleaning up failed sandbox \"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:41:17.598400 env[1209]: time="2025-05-17T00:41:17.594321099Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-959dd,Uid:89a8ad48-0dd5-49a4-8e14-981634b82dde,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:41:17.595294 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b-shm.mount: Deactivated successfully. May 17 00:41:17.598713 kubelet[1454]: E0517 00:41:17.594577 1454 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:41:17.598713 kubelet[1454]: E0517 00:41:17.594656 1454 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-959dd" May 17 00:41:17.598713 kubelet[1454]: E0517 00:41:17.594683 1454 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-959dd" May 17 00:41:17.598864 kubelet[1454]: E0517 00:41:17.594745 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-959dd_calico-system(89a8ad48-0dd5-49a4-8e14-981634b82dde)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-959dd_calico-system(89a8ad48-0dd5-49a4-8e14-981634b82dde)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-959dd" podUID="89a8ad48-0dd5-49a4-8e14-981634b82dde" May 17 00:41:18.410973 kubelet[1454]: I0517 00:41:18.410906 1454 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" May 17 00:41:18.412014 env[1209]: time="2025-05-17T00:41:18.411962019Z" level=info msg="StopPodSandbox for \"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b\"" May 17 00:41:18.486907 env[1209]: time="2025-05-17T00:41:18.486788713Z" level=error msg="StopPodSandbox for \"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b\" failed" error="failed to destroy network for sandbox \"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:41:18.487440 kubelet[1454]: E0517 00:41:18.487350 1454 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" May 17 00:41:18.487676 kubelet[1454]: E0517 00:41:18.487446 1454 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b"} May 17 00:41:18.487676 kubelet[1454]: E0517 00:41:18.487527 1454 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"89a8ad48-0dd5-49a4-8e14-981634b82dde\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:41:18.487676 kubelet[1454]: E0517 00:41:18.487564 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"89a8ad48-0dd5-49a4-8e14-981634b82dde\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-959dd" podUID="89a8ad48-0dd5-49a4-8e14-981634b82dde" May 17 00:41:18.564277 kubelet[1454]: E0517 00:41:18.564207 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:19.521393 kubelet[1454]: E0517 00:41:19.521299 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:19.565093 kubelet[1454]: E0517 00:41:19.564911 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:19.798878 kernel: kauditd_printk_skb: 40 callbacks suppressed May 17 00:41:19.799111 kernel: audit: type=1325 audit(1747442479.792:511): table=filter:71 family=2 entries=12 op=nft_register_rule pid=1982 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:19.792000 audit[1982]: NETFILTER_CFG table=filter:71 family=2 entries=12 op=nft_register_rule pid=1982 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:19.792000 audit[1982]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff5bca02c0 a2=0 a3=7fff5bca02ac items=0 ppid=1710 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:19.825501 kernel: audit: type=1300 audit(1747442479.792:511): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff5bca02c0 a2=0 a3=7fff5bca02ac items=0 ppid=1710 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:19.825701 kernel: audit: type=1327 audit(1747442479.792:511): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:19.792000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:19.848000 audit[1982]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=1982 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:19.848000 audit[1982]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff5bca02c0 a2=0 a3=7fff5bca02ac items=0 ppid=1710 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:19.879332 kernel: audit: type=1325 audit(1747442479.848:512): table=nat:72 family=2 entries=22 op=nft_register_rule pid=1982 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:19.879520 kernel: audit: type=1300 audit(1747442479.848:512): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff5bca02c0 a2=0 a3=7fff5bca02ac items=0 ppid=1710 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:19.879552 kernel: audit: type=1327 audit(1747442479.848:512): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:19.848000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:20.267766 systemd[1]: Created slice kubepods-besteffort-pod8e2cac36_6823_42b7_9b3d_26594b09e84f.slice. May 17 00:41:20.353034 kubelet[1454]: I0517 00:41:20.352942 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hspsg\" (UniqueName: \"kubernetes.io/projected/8e2cac36-6823-42b7-9b3d-26594b09e84f-kube-api-access-hspsg\") pod \"nginx-deployment-7fcdb87857-96gg6\" (UID: \"8e2cac36-6823-42b7-9b3d-26594b09e84f\") " pod="default/nginx-deployment-7fcdb87857-96gg6" May 17 00:41:20.565813 kubelet[1454]: E0517 00:41:20.565613 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:20.577471 env[1209]: time="2025-05-17T00:41:20.577392159Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-96gg6,Uid:8e2cac36-6823-42b7-9b3d-26594b09e84f,Namespace:default,Attempt:0,}" May 17 00:41:21.565908 kubelet[1454]: E0517 00:41:21.565808 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:21.659598 env[1209]: time="2025-05-17T00:41:21.659499521Z" level=error msg="Failed to destroy network for sandbox \"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:41:21.668017 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7-shm.mount: Deactivated successfully. May 17 00:41:21.671884 env[1209]: time="2025-05-17T00:41:21.670206532Z" level=error msg="encountered an error cleaning up failed sandbox \"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:41:21.671884 env[1209]: time="2025-05-17T00:41:21.670633886Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-96gg6,Uid:8e2cac36-6823-42b7-9b3d-26594b09e84f,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:41:21.673753 kubelet[1454]: E0517 00:41:21.673215 1454 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:41:21.673753 kubelet[1454]: E0517 00:41:21.673299 1454 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-96gg6" May 17 00:41:21.673753 kubelet[1454]: E0517 00:41:21.673346 1454 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-96gg6" May 17 00:41:21.674065 kubelet[1454]: E0517 00:41:21.673430 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-96gg6_default(8e2cac36-6823-42b7-9b3d-26594b09e84f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-96gg6_default(8e2cac36-6823-42b7-9b3d-26594b09e84f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-96gg6" podUID="8e2cac36-6823-42b7-9b3d-26594b09e84f" May 17 00:41:22.443812 kubelet[1454]: I0517 00:41:22.440680 1454 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" May 17 00:41:22.444158 env[1209]: time="2025-05-17T00:41:22.441655228Z" level=info msg="StopPodSandbox for \"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7\"" May 17 00:41:22.579440 kubelet[1454]: E0517 00:41:22.571843 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:22.602106 env[1209]: time="2025-05-17T00:41:22.595578806Z" level=error msg="StopPodSandbox for \"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7\" failed" error="failed to destroy network for sandbox \"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:41:22.604624 kubelet[1454]: E0517 00:41:22.604549 1454 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" May 17 00:41:22.604624 kubelet[1454]: E0517 00:41:22.604618 1454 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7"} May 17 00:41:22.604916 kubelet[1454]: E0517 00:41:22.604661 1454 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8e2cac36-6823-42b7-9b3d-26594b09e84f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:41:22.604916 kubelet[1454]: E0517 00:41:22.604688 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8e2cac36-6823-42b7-9b3d-26594b09e84f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-96gg6" podUID="8e2cac36-6823-42b7-9b3d-26594b09e84f" May 17 00:41:23.572612 kubelet[1454]: E0517 00:41:23.572516 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:24.572915 kubelet[1454]: E0517 00:41:24.572816 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:25.573641 kubelet[1454]: E0517 00:41:25.573510 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:26.577454 kubelet[1454]: E0517 00:41:26.573917 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:27.126476 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3364057355.mount: Deactivated successfully. May 17 00:41:27.574812 kubelet[1454]: E0517 00:41:27.574644 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:28.141996 env[1209]: time="2025-05-17T00:41:28.141013311Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:28.157888 env[1209]: time="2025-05-17T00:41:28.147492073Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:28.157888 env[1209]: time="2025-05-17T00:41:28.154663550Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:28.158265 env[1209]: time="2025-05-17T00:41:28.158207172Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:28.158642 env[1209]: time="2025-05-17T00:41:28.158589532Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 00:41:28.185341 env[1209]: time="2025-05-17T00:41:28.185281517Z" level=info msg="CreateContainer within sandbox \"7b8e5a71a8108db7d6f7cf0152f0eb588064b7e887015840875369d94f3977ba\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:41:28.226271 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount318642127.mount: Deactivated successfully. May 17 00:41:28.248542 env[1209]: time="2025-05-17T00:41:28.248443936Z" level=info msg="CreateContainer within sandbox \"7b8e5a71a8108db7d6f7cf0152f0eb588064b7e887015840875369d94f3977ba\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"4de45dd362682e513196410bc521b132e5d85cb55da3a48dbfbbede94f732579\"" May 17 00:41:28.251850 env[1209]: time="2025-05-17T00:41:28.251786534Z" level=info msg="StartContainer for \"4de45dd362682e513196410bc521b132e5d85cb55da3a48dbfbbede94f732579\"" May 17 00:41:28.327269 systemd[1]: Started cri-containerd-4de45dd362682e513196410bc521b132e5d85cb55da3a48dbfbbede94f732579.scope. May 17 00:41:28.363000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.363000 audit[2044]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fce9c2219b8 items=0 ppid=1580 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:28.379070 kernel: audit: type=1400 audit(1747442488.363:513): avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.379191 kernel: audit: type=1300 audit(1747442488.363:513): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fce9c2219b8 items=0 ppid=1580 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:28.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464653435646433363236383265353133313936343130626335323162 May 17 00:41:28.385595 kernel: audit: type=1327 audit(1747442488.363:513): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464653435646433363236383265353133313936343130626335323162 May 17 00:41:28.386242 kernel: audit: type=1400 audit(1747442488.363:514): avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.363000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.363000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.402948 kernel: audit: type=1400 audit(1747442488.363:514): avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.409501 kernel: audit: type=1400 audit(1747442488.363:514): avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.363000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.416517 kernel: audit: type=1400 audit(1747442488.363:514): avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.363000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.363000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.433586 kernel: audit: type=1400 audit(1747442488.363:514): avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.433743 kernel: audit: type=1400 audit(1747442488.363:514): avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.363000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.436901 kernel: audit: type=1400 audit(1747442488.363:514): avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.363000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.363000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.363000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.363000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.363000 audit: BPF prog-id=72 op=LOAD May 17 00:41:28.363000 audit[2044]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000219198 items=0 ppid=1580 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:28.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464653435646433363236383265353133313936343130626335323162 May 17 00:41:28.379000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.379000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.379000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.379000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.379000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.379000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.379000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.379000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.379000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.379000 audit: BPF prog-id=73 op=LOAD May 17 00:41:28.379000 audit[2044]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0002191e8 items=0 ppid=1580 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:28.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464653435646433363236383265353133313936343130626335323162 May 17 00:41:28.385000 audit: BPF prog-id=73 op=UNLOAD May 17 00:41:28.385000 audit: BPF prog-id=72 op=UNLOAD May 17 00:41:28.385000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.385000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.385000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.385000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.385000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.385000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.385000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.385000 audit[2044]: AVC avc: denied { perfmon } for pid=2044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.385000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.385000 audit[2044]: AVC avc: denied { bpf } for pid=2044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:28.385000 audit: BPF prog-id=74 op=LOAD May 17 00:41:28.385000 audit[2044]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000219278 items=0 ppid=1580 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:28.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464653435646433363236383265353133313936343130626335323162 May 17 00:41:28.455575 env[1209]: time="2025-05-17T00:41:28.453476950Z" level=info msg="StartContainer for \"4de45dd362682e513196410bc521b132e5d85cb55da3a48dbfbbede94f732579\" returns successfully" May 17 00:41:28.584638 kubelet[1454]: E0517 00:41:28.584440 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:28.742458 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:41:28.742668 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:41:29.585055 kubelet[1454]: E0517 00:41:29.584944 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:30.359000 audit[2176]: AVC avc: denied { write } for pid=2176 comm="tee" name="fd" dev="proc" ino=20749 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:41:30.359000 audit[2176]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee5d837e8 a2=241 a3=1b6 items=1 ppid=2161 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.359000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:41:30.359000 audit: PATH item=0 name="/dev/fd/63" inode=20744 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:30.359000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:41:30.372000 audit[2208]: AVC avc: denied { write } for pid=2208 comm="tee" name="fd" dev="proc" ino=20766 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:41:30.372000 audit[2208]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffca71237e8 a2=241 a3=1b6 items=1 ppid=2157 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.372000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:41:30.372000 audit: PATH item=0 name="/dev/fd/63" inode=20763 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:30.372000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:41:30.378000 audit[2219]: AVC avc: denied { write } for pid=2219 comm="tee" name="fd" dev="proc" ino=20773 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:41:30.378000 audit[2219]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2c64e7d8 a2=241 a3=1b6 items=1 ppid=2166 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.378000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:41:30.378000 audit: PATH item=0 name="/dev/fd/63" inode=20770 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:30.378000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:41:30.380000 audit[2217]: AVC avc: denied { write } for pid=2217 comm="tee" name="fd" dev="proc" ino=20777 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:41:30.380000 audit[2217]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5f7c47d9 a2=241 a3=1b6 items=1 ppid=2158 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.380000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:41:30.380000 audit: PATH item=0 name="/dev/fd/63" inode=18336 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:30.380000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:41:30.380000 audit[2211]: AVC avc: denied { write } for pid=2211 comm="tee" name="fd" dev="proc" ino=18339 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:41:30.380000 audit[2211]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff94a397ea a2=241 a3=1b6 items=1 ppid=2165 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.380000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:41:30.380000 audit: PATH item=0 name="/dev/fd/63" inode=18331 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:30.380000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:41:30.389000 audit[2222]: AVC avc: denied { write } for pid=2222 comm="tee" name="fd" dev="proc" ino=18343 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:41:30.389000 audit[2222]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd46d07e8 a2=241 a3=1b6 items=1 ppid=2162 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.389000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:41:30.389000 audit: PATH item=0 name="/dev/fd/63" inode=19297 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:30.389000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:41:30.498000 audit[2239]: AVC avc: denied { write } for pid=2239 comm="tee" name="fd" dev="proc" ino=19308 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:41:30.498000 audit[2239]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffb3bcb7e9 a2=241 a3=1b6 items=1 ppid=2168 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.498000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:41:30.498000 audit: PATH item=0 name="/dev/fd/63" inode=20043 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:41:30.498000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:41:30.587134 kubelet[1454]: E0517 00:41:30.585860 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:30.688000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.688000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.688000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.688000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.688000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.688000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.688000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.688000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.688000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.688000 audit: BPF prog-id=75 op=LOAD May 17 00:41:30.688000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc6ffab550 a2=98 a3=3 items=0 ppid=2159 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.688000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.692000 audit: BPF prog-id=75 op=UNLOAD May 17 00:41:30.692000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.692000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.692000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.692000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.692000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.692000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.692000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.692000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.692000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.692000 audit: BPF prog-id=76 op=LOAD May 17 00:41:30.692000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc6ffab340 a2=94 a3=54428f items=0 ppid=2159 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.692000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.700000 audit: BPF prog-id=76 op=UNLOAD May 17 00:41:30.700000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.700000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.700000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.700000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.700000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.700000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.700000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.700000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.700000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.700000 audit: BPF prog-id=77 op=LOAD May 17 00:41:30.700000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc6ffab370 a2=94 a3=2 items=0 ppid=2159 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.700000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.707000 audit: BPF prog-id=77 op=UNLOAD May 17 00:41:30.870000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.870000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.870000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.870000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.870000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.870000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.870000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.870000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.870000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.870000 audit: BPF prog-id=78 op=LOAD May 17 00:41:30.870000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc6ffab230 a2=94 a3=1 items=0 ppid=2159 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.870000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.880000 audit: BPF prog-id=78 op=UNLOAD May 17 00:41:30.880000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.880000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc6ffab300 a2=50 a3=7ffc6ffab3e0 items=0 ppid=2159 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.880000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.891000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.891000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc6ffab240 a2=28 a3=0 items=0 ppid=2159 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.891000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.898000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.898000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc6ffab270 a2=28 a3=0 items=0 ppid=2159 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.898000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.898000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc6ffab180 a2=28 a3=0 items=0 ppid=2159 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.898000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.898000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc6ffab290 a2=28 a3=0 items=0 ppid=2159 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.898000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.898000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc6ffab270 a2=28 a3=0 items=0 ppid=2159 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.898000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.898000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc6ffab260 a2=28 a3=0 items=0 ppid=2159 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.898000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.898000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc6ffab290 a2=28 a3=0 items=0 ppid=2159 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.898000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.898000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc6ffab270 a2=28 a3=0 items=0 ppid=2159 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.898000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.898000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc6ffab290 a2=28 a3=0 items=0 ppid=2159 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.898000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.898000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc6ffab260 a2=28 a3=0 items=0 ppid=2159 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.898000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.898000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc6ffab2d0 a2=28 a3=0 items=0 ppid=2159 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.898000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.899000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.899000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc6ffab080 a2=50 a3=1 items=0 ppid=2159 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.899000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.899000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.899000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.899000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.899000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.899000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.899000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.899000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.899000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.899000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.899000 audit: BPF prog-id=79 op=LOAD May 17 00:41:30.899000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc6ffab080 a2=94 a3=5 items=0 ppid=2159 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.899000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.902000 audit: BPF prog-id=79 op=UNLOAD May 17 00:41:30.902000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc6ffab130 a2=50 a3=1 items=0 ppid=2159 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.902000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.902000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc6ffab250 a2=4 a3=38 items=0 ppid=2159 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.902000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.902000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { confidentiality } for pid=2280 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:30.902000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc6ffab2a0 a2=94 a3=6 items=0 ppid=2159 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.902000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.902000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { confidentiality } for pid=2280 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:30.902000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc6ffaaa50 a2=94 a3=88 items=0 ppid=2159 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.902000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.902000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.902000 audit[2280]: AVC avc: denied { confidentiality } for pid=2280 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:30.902000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc6ffaaa50 a2=94 a3=88 items=0 ppid=2159 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.902000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:41:30.929000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.929000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.929000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.929000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.929000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.929000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.929000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.929000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.929000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.929000 audit: BPF prog-id=80 op=LOAD May 17 00:41:30.929000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd8552fa10 a2=98 a3=1999999999999999 items=0 ppid=2159 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.929000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:41:30.948000 audit: BPF prog-id=80 op=UNLOAD May 17 00:41:30.948000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.948000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.948000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.948000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.948000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.948000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.948000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.948000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.948000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.948000 audit: BPF prog-id=81 op=LOAD May 17 00:41:30.948000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd8552f8f0 a2=94 a3=ffff items=0 ppid=2159 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.948000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:41:30.957000 audit: BPF prog-id=81 op=UNLOAD May 17 00:41:30.957000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.957000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.957000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.957000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.957000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.957000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.957000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.957000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.957000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:30.957000 audit: BPF prog-id=82 op=LOAD May 17 00:41:30.957000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd8552f930 a2=94 a3=7ffd8552fb10 items=0 ppid=2159 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:30.957000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:41:30.961000 audit: BPF prog-id=82 op=UNLOAD May 17 00:41:31.102395 systemd-networkd[1024]: vxlan.calico: Link UP May 17 00:41:31.102407 systemd-networkd[1024]: vxlan.calico: Gained carrier May 17 00:41:31.155000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.155000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.155000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.155000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.155000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.155000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.155000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.155000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.155000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.155000 audit: BPF prog-id=83 op=LOAD May 17 00:41:31.155000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff8dd2e980 a2=98 a3=0 items=0 ppid=2159 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.155000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:31.171000 audit: BPF prog-id=83 op=UNLOAD May 17 00:41:31.171000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.171000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.171000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.171000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.171000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.171000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.171000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.171000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.171000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.171000 audit: BPF prog-id=84 op=LOAD May 17 00:41:31.171000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff8dd2e790 a2=94 a3=54428f items=0 ppid=2159 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.171000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:31.172000 audit: BPF prog-id=84 op=UNLOAD May 17 00:41:31.172000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.172000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.172000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.172000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.172000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.172000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.172000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.172000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.172000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.172000 audit: BPF prog-id=85 op=LOAD May 17 00:41:31.172000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff8dd2e7c0 a2=94 a3=2 items=0 ppid=2159 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.172000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:31.185000 audit: BPF prog-id=85 op=UNLOAD May 17 00:41:31.185000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.185000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff8dd2e690 a2=28 a3=0 items=0 ppid=2159 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:31.185000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.185000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8dd2e6c0 a2=28 a3=0 items=0 ppid=2159 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:31.185000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.185000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8dd2e5d0 a2=28 a3=0 items=0 ppid=2159 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:31.185000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.185000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff8dd2e6e0 a2=28 a3=0 items=0 ppid=2159 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:31.185000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.185000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff8dd2e6c0 a2=28 a3=0 items=0 ppid=2159 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:31.185000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.185000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff8dd2e6b0 a2=28 a3=0 items=0 ppid=2159 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:31.185000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.185000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff8dd2e6e0 a2=28 a3=0 items=0 ppid=2159 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:31.185000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.185000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8dd2e6c0 a2=28 a3=0 items=0 ppid=2159 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:31.185000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.185000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8dd2e6e0 a2=28 a3=0 items=0 ppid=2159 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:31.185000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.185000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff8dd2e6b0 a2=28 a3=0 items=0 ppid=2159 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:31.185000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.185000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff8dd2e720 a2=28 a3=0 items=0 ppid=2159 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:31.185000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.185000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.185000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.185000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.185000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.185000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.185000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.185000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.185000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.185000 audit: BPF prog-id=86 op=LOAD May 17 00:41:31.185000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff8dd2e590 a2=94 a3=0 items=0 ppid=2159 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:31.185000 audit: BPF prog-id=86 op=UNLOAD May 17 00:41:31.186000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.186000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff8dd2e580 a2=50 a3=2800 items=0 ppid=2159 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.186000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:31.186000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.186000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff8dd2e580 a2=50 a3=2800 items=0 ppid=2159 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.186000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:31.186000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.186000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.186000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.186000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.186000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.186000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.186000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.186000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.186000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.186000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.186000 audit: BPF prog-id=87 op=LOAD May 17 00:41:31.186000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff8dd2dda0 a2=94 a3=2 items=0 ppid=2159 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.186000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:31.187000 audit: BPF prog-id=87 op=UNLOAD May 17 00:41:31.187000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.187000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.187000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.187000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.187000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.187000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.187000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.187000 audit[2309]: AVC avc: denied { perfmon } for pid=2309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.187000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.187000 audit[2309]: AVC avc: denied { bpf } for pid=2309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.187000 audit: BPF prog-id=88 op=LOAD May 17 00:41:31.187000 audit[2309]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff8dd2dea0 a2=94 a3=30 items=0 ppid=2159 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.187000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:41:31.202000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.202000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.202000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.202000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.202000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.202000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.202000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.202000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.202000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.202000 audit: BPF prog-id=89 op=LOAD May 17 00:41:31.202000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff238871f0 a2=98 a3=0 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.202000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.203000 audit: BPF prog-id=89 op=UNLOAD May 17 00:41:31.203000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.203000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.203000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.203000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.203000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.203000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.203000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.203000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.203000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.203000 audit: BPF prog-id=90 op=LOAD May 17 00:41:31.203000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff23886fe0 a2=94 a3=54428f items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.203000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.203000 audit: BPF prog-id=90 op=UNLOAD May 17 00:41:31.203000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.203000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.203000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.203000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.203000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.203000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.203000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.203000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.203000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.203000 audit: BPF prog-id=91 op=LOAD May 17 00:41:31.203000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff23887010 a2=94 a3=2 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.203000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.204000 audit: BPF prog-id=91 op=UNLOAD May 17 00:41:31.231094 env[1209]: time="2025-05-17T00:41:31.231006280Z" level=info msg="StopPodSandbox for \"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b\"" May 17 00:41:31.397000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.397000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.397000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.397000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.397000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.397000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.397000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.397000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.397000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.397000 audit: BPF prog-id=92 op=LOAD May 17 00:41:31.397000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff23886ed0 a2=94 a3=1 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.398000 audit: BPF prog-id=92 op=UNLOAD May 17 00:41:31.398000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.398000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff23886fa0 a2=50 a3=7fff23887080 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.398000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.409000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.409000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff23886ee0 a2=28 a3=0 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.409000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.409000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.409000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff23886f10 a2=28 a3=0 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.409000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.409000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.409000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff23886e20 a2=28 a3=0 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.409000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.409000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.409000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff23886f30 a2=28 a3=0 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.409000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.409000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.409000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff23886f10 a2=28 a3=0 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.409000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.409000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.409000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff23886f00 a2=28 a3=0 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.409000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.409000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.409000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff23886f30 a2=28 a3=0 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.409000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.409000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.409000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff23886f10 a2=28 a3=0 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.409000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.409000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.409000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff23886f30 a2=28 a3=0 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.409000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.409000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.409000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff23886f00 a2=28 a3=0 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.409000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.409000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.409000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff23886f70 a2=28 a3=0 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.409000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.410000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.410000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff23886d20 a2=50 a3=1 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.410000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.410000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.410000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.410000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.410000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.410000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.410000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.410000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.410000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.410000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.410000 audit: BPF prog-id=93 op=LOAD May 17 00:41:31.410000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff23886d20 a2=94 a3=5 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.410000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.411000 audit: BPF prog-id=93 op=UNLOAD May 17 00:41:31.411000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff23886dd0 a2=50 a3=1 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.411000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff23886ef0 a2=4 a3=38 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.411000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { confidentiality } for pid=2319 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:31.411000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff23886f40 a2=94 a3=6 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.411000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { confidentiality } for pid=2319 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:31.411000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff238866f0 a2=94 a3=88 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.411000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.411000 audit[2319]: AVC avc: denied { confidentiality } for pid=2319 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:41:31.411000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff238866f0 a2=94 a3=88 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.411000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.412000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.412000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff23888120 a2=10 a3=208 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.412000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.412000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.412000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff23887fc0 a2=10 a3=3 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.412000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.412000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.412000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff23887f60 a2=10 a3=3 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.412000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.412000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:31.412000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff23887f60 a2=10 a3=7 items=0 ppid=2159 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.412000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:41:31.423000 audit: BPF prog-id=88 op=UNLOAD May 17 00:41:31.441862 kubelet[1454]: I0517 00:41:31.441689 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-cs6n6" podStartSLOduration=5.814662276 podStartE2EDuration="31.441662836s" podCreationTimestamp="2025-05-17 00:41:00 +0000 UTC" firstStartedPulling="2025-05-17 00:41:02.533460279 +0000 UTC m=+3.833662667" lastFinishedPulling="2025-05-17 00:41:28.160460839 +0000 UTC m=+29.460663227" observedRunningTime="2025-05-17 00:41:28.590096231 +0000 UTC m=+29.890298619" watchObservedRunningTime="2025-05-17 00:41:31.441662836 +0000 UTC m=+32.741865224" May 17 00:41:31.518989 env[1209]: 2025-05-17 00:41:31.442 [INFO][2331] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" May 17 00:41:31.518989 env[1209]: 2025-05-17 00:41:31.442 [INFO][2331] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" iface="eth0" netns="/var/run/netns/cni-8709393d-dcba-1f28-a651-6924e054c9fd" May 17 00:41:31.518989 env[1209]: 2025-05-17 00:41:31.442 [INFO][2331] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" iface="eth0" netns="/var/run/netns/cni-8709393d-dcba-1f28-a651-6924e054c9fd" May 17 00:41:31.518989 env[1209]: 2025-05-17 00:41:31.443 [INFO][2331] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" iface="eth0" netns="/var/run/netns/cni-8709393d-dcba-1f28-a651-6924e054c9fd" May 17 00:41:31.518989 env[1209]: 2025-05-17 00:41:31.443 [INFO][2331] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" May 17 00:41:31.518989 env[1209]: 2025-05-17 00:41:31.443 [INFO][2331] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" May 17 00:41:31.518989 env[1209]: 2025-05-17 00:41:31.475 [INFO][2347] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" HandleID="k8s-pod-network.cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" Workload="10.0.0.142-k8s-csi--node--driver--959dd-eth0" May 17 00:41:31.518989 env[1209]: 2025-05-17 00:41:31.475 [INFO][2347] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:31.518989 env[1209]: 2025-05-17 00:41:31.475 [INFO][2347] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:31.518989 env[1209]: 2025-05-17 00:41:31.502 [WARNING][2347] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" HandleID="k8s-pod-network.cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" Workload="10.0.0.142-k8s-csi--node--driver--959dd-eth0" May 17 00:41:31.518989 env[1209]: 2025-05-17 00:41:31.502 [INFO][2347] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" HandleID="k8s-pod-network.cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" Workload="10.0.0.142-k8s-csi--node--driver--959dd-eth0" May 17 00:41:31.518989 env[1209]: 2025-05-17 00:41:31.512 [INFO][2347] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:31.518989 env[1209]: 2025-05-17 00:41:31.515 [INFO][2331] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" May 17 00:41:31.531279 systemd[1]: run-netns-cni\x2d8709393d\x2ddcba\x2d1f28\x2da651\x2d6924e054c9fd.mount: Deactivated successfully. May 17 00:41:31.531000 audit[2369]: NETFILTER_CFG table=mangle:73 family=2 entries=16 op=nft_register_chain pid=2369 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:31.531000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd865f48d0 a2=0 a3=7ffd865f48bc items=0 ppid=2159 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.531000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:31.533921 env[1209]: time="2025-05-17T00:41:31.533847345Z" level=info msg="TearDown network for sandbox \"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b\" successfully" May 17 00:41:31.533921 env[1209]: time="2025-05-17T00:41:31.533916718Z" level=info msg="StopPodSandbox for \"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b\" returns successfully" May 17 00:41:31.534833 env[1209]: time="2025-05-17T00:41:31.534783229Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-959dd,Uid:89a8ad48-0dd5-49a4-8e14-981634b82dde,Namespace:calico-system,Attempt:1,}" May 17 00:41:31.587072 kubelet[1454]: E0517 00:41:31.586967 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:31.983000 audit[2365]: NETFILTER_CFG table=nat:74 family=2 entries=15 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:31.983000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd1a12f730 a2=0 a3=7ffd1a12f71c items=0 ppid=2159 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.983000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:31.985000 audit[2372]: NETFILTER_CFG table=filter:75 family=2 entries=39 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:31.985000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffd929b8440 a2=0 a3=7ffd929b842c items=0 ppid=2159 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.987000 audit[2368]: NETFILTER_CFG table=raw:76 family=2 entries=21 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:31.985000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:31.987000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffce08c32a0 a2=0 a3=564d3494a000 items=0 ppid=2159 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:31.987000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:32.205066 systemd-networkd[1024]: vxlan.calico: Gained IPv6LL May 17 00:41:32.408689 systemd-networkd[1024]: cali7623b6c64aa: Link UP May 17 00:41:32.416730 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:41:32.416915 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7623b6c64aa: link becomes ready May 17 00:41:32.417114 systemd-networkd[1024]: cali7623b6c64aa: Gained carrier May 17 00:41:32.481092 env[1209]: 2025-05-17 00:41:32.111 [INFO][2379] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.142-k8s-csi--node--driver--959dd-eth0 csi-node-driver- calico-system 89a8ad48-0dd5-49a4-8e14-981634b82dde 1252 0 2025-05-17 00:41:00 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:78f6f74485 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.142 csi-node-driver-959dd eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali7623b6c64aa [] [] }} ContainerID="d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425" Namespace="calico-system" Pod="csi-node-driver-959dd" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--959dd-" May 17 00:41:32.481092 env[1209]: 2025-05-17 00:41:32.111 [INFO][2379] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425" Namespace="calico-system" Pod="csi-node-driver-959dd" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--959dd-eth0" May 17 00:41:32.481092 env[1209]: 2025-05-17 00:41:32.210 [INFO][2394] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425" HandleID="k8s-pod-network.d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425" Workload="10.0.0.142-k8s-csi--node--driver--959dd-eth0" May 17 00:41:32.481092 env[1209]: 2025-05-17 00:41:32.212 [INFO][2394] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425" HandleID="k8s-pod-network.d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425" Workload="10.0.0.142-k8s-csi--node--driver--959dd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ac760), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.142", "pod":"csi-node-driver-959dd", "timestamp":"2025-05-17 00:41:32.210807891 +0000 UTC"}, Hostname:"10.0.0.142", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:41:32.481092 env[1209]: 2025-05-17 00:41:32.212 [INFO][2394] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:32.481092 env[1209]: 2025-05-17 00:41:32.212 [INFO][2394] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:32.481092 env[1209]: 2025-05-17 00:41:32.212 [INFO][2394] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.142' May 17 00:41:32.481092 env[1209]: 2025-05-17 00:41:32.256 [INFO][2394] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425" host="10.0.0.142" May 17 00:41:32.481092 env[1209]: 2025-05-17 00:41:32.282 [INFO][2394] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.142" May 17 00:41:32.481092 env[1209]: 2025-05-17 00:41:32.306 [INFO][2394] ipam/ipam.go 511: Trying affinity for 192.168.25.128/26 host="10.0.0.142" May 17 00:41:32.481092 env[1209]: 2025-05-17 00:41:32.315 [INFO][2394] ipam/ipam.go 158: Attempting to load block cidr=192.168.25.128/26 host="10.0.0.142" May 17 00:41:32.481092 env[1209]: 2025-05-17 00:41:32.328 [INFO][2394] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.25.128/26 host="10.0.0.142" May 17 00:41:32.481092 env[1209]: 2025-05-17 00:41:32.328 [INFO][2394] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.25.128/26 handle="k8s-pod-network.d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425" host="10.0.0.142" May 17 00:41:32.481092 env[1209]: 2025-05-17 00:41:32.337 [INFO][2394] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425 May 17 00:41:32.481092 env[1209]: 2025-05-17 00:41:32.353 [INFO][2394] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.25.128/26 handle="k8s-pod-network.d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425" host="10.0.0.142" May 17 00:41:32.481092 env[1209]: 2025-05-17 00:41:32.373 [INFO][2394] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.25.129/26] block=192.168.25.128/26 handle="k8s-pod-network.d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425" host="10.0.0.142" May 17 00:41:32.481092 env[1209]: 2025-05-17 00:41:32.373 [INFO][2394] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.25.129/26] handle="k8s-pod-network.d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425" host="10.0.0.142" May 17 00:41:32.481092 env[1209]: 2025-05-17 00:41:32.373 [INFO][2394] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:32.481092 env[1209]: 2025-05-17 00:41:32.373 [INFO][2394] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.25.129/26] IPv6=[] ContainerID="d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425" HandleID="k8s-pod-network.d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425" Workload="10.0.0.142-k8s-csi--node--driver--959dd-eth0" May 17 00:41:32.484660 env[1209]: 2025-05-17 00:41:32.382 [INFO][2379] cni-plugin/k8s.go 418: Populated endpoint ContainerID="d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425" Namespace="calico-system" Pod="csi-node-driver-959dd" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--959dd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-csi--node--driver--959dd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"89a8ad48-0dd5-49a4-8e14-981634b82dde", ResourceVersion:"1252", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"", Pod:"csi-node-driver-959dd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.25.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7623b6c64aa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:32.484660 env[1209]: 2025-05-17 00:41:32.383 [INFO][2379] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.25.129/32] ContainerID="d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425" Namespace="calico-system" Pod="csi-node-driver-959dd" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--959dd-eth0" May 17 00:41:32.484660 env[1209]: 2025-05-17 00:41:32.383 [INFO][2379] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7623b6c64aa ContainerID="d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425" Namespace="calico-system" Pod="csi-node-driver-959dd" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--959dd-eth0" May 17 00:41:32.484660 env[1209]: 2025-05-17 00:41:32.412 [INFO][2379] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425" Namespace="calico-system" Pod="csi-node-driver-959dd" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--959dd-eth0" May 17 00:41:32.484660 env[1209]: 2025-05-17 00:41:32.412 [INFO][2379] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425" Namespace="calico-system" Pod="csi-node-driver-959dd" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--959dd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-csi--node--driver--959dd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"89a8ad48-0dd5-49a4-8e14-981634b82dde", ResourceVersion:"1252", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425", Pod:"csi-node-driver-959dd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.25.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7623b6c64aa", MAC:"06:5c:30:95:8a:c4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:32.484660 env[1209]: 2025-05-17 00:41:32.465 [INFO][2379] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425" Namespace="calico-system" Pod="csi-node-driver-959dd" WorkloadEndpoint="10.0.0.142-k8s-csi--node--driver--959dd-eth0" May 17 00:41:32.505853 env[1209]: time="2025-05-17T00:41:32.505146021Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:41:32.505853 env[1209]: time="2025-05-17T00:41:32.505201046Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:41:32.505853 env[1209]: time="2025-05-17T00:41:32.505217397Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:41:32.505853 env[1209]: time="2025-05-17T00:41:32.505504683Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425 pid=2419 runtime=io.containerd.runc.v2 May 17 00:41:32.539064 systemd[1]: run-containerd-runc-k8s.io-d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425-runc.1OGkld.mount: Deactivated successfully. May 17 00:41:32.553778 systemd[1]: Started cri-containerd-d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425.scope. May 17 00:41:32.488000 audit[2407]: NETFILTER_CFG table=filter:77 family=2 entries=38 op=nft_register_chain pid=2407 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:32.488000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffccc38ab40 a2=0 a3=7ffccc38ab2c items=0 ppid=2159 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:32.488000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:32.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.565000 audit: BPF prog-id=94 op=LOAD May 17 00:41:32.567000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.567000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2419 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:32.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437633634366631373066643565666131386539336638303039333539 May 17 00:41:32.567000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.567000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2419 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:32.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437633634366631373066643565666131386539336638303039333539 May 17 00:41:32.567000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.567000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.567000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.567000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.567000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.567000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.567000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.567000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.567000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.567000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.567000 audit: BPF prog-id=95 op=LOAD May 17 00:41:32.567000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00028e520 items=0 ppid=2419 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:32.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437633634366631373066643565666131386539336638303039333539 May 17 00:41:32.568000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.568000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.568000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.568000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.568000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.568000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.568000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.568000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.568000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.568000 audit: BPF prog-id=96 op=LOAD May 17 00:41:32.568000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00028e568 items=0 ppid=2419 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:32.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437633634366631373066643565666131386539336638303039333539 May 17 00:41:32.568000 audit: BPF prog-id=96 op=UNLOAD May 17 00:41:32.568000 audit: BPF prog-id=95 op=UNLOAD May 17 00:41:32.568000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.568000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.568000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.568000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.568000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.568000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.568000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.568000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.568000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.568000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:32.568000 audit: BPF prog-id=97 op=LOAD May 17 00:41:32.568000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00028e978 items=0 ppid=2419 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:32.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437633634366631373066643565666131386539336638303039333539 May 17 00:41:32.571846 systemd-resolved[1147]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:41:32.588169 kubelet[1454]: E0517 00:41:32.588074 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:32.592608 env[1209]: time="2025-05-17T00:41:32.592544303Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-959dd,Uid:89a8ad48-0dd5-49a4-8e14-981634b82dde,Namespace:calico-system,Attempt:1,} returns sandbox id \"d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425\"" May 17 00:41:32.594943 env[1209]: time="2025-05-17T00:41:32.594851524Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:41:33.566911 update_engine[1197]: I0517 00:41:33.566810 1197 update_attempter.cc:509] Updating boot flags... May 17 00:41:33.592319 kubelet[1454]: E0517 00:41:33.592281 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:34.060345 systemd-networkd[1024]: cali7623b6c64aa: Gained IPv6LL May 17 00:41:34.598120 kubelet[1454]: E0517 00:41:34.598022 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:34.632523 env[1209]: time="2025-05-17T00:41:34.632346887Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:34.634953 env[1209]: time="2025-05-17T00:41:34.634812381Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:34.638775 env[1209]: time="2025-05-17T00:41:34.638680249Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:34.641785 env[1209]: time="2025-05-17T00:41:34.641694406Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 00:41:34.642385 env[1209]: time="2025-05-17T00:41:34.642120986Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:34.649220 env[1209]: time="2025-05-17T00:41:34.649148878Z" level=info msg="CreateContainer within sandbox \"d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:41:34.674228 env[1209]: time="2025-05-17T00:41:34.674119929Z" level=info msg="CreateContainer within sandbox \"d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"bd4387933c176f20cb9d9f1fe399cb475a33234b430037aff51efc75066d04f7\"" May 17 00:41:34.675620 env[1209]: time="2025-05-17T00:41:34.675543102Z" level=info msg="StartContainer for \"bd4387933c176f20cb9d9f1fe399cb475a33234b430037aff51efc75066d04f7\"" May 17 00:41:34.751492 systemd[1]: Started cri-containerd-bd4387933c176f20cb9d9f1fe399cb475a33234b430037aff51efc75066d04f7.scope. May 17 00:41:34.796000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.801303 kernel: kauditd_printk_skb: 608 callbacks suppressed May 17 00:41:34.801369 kernel: audit: type=1400 audit(1747442494.796:640): avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.796000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f8e06d01188 items=0 ppid=2419 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:34.818205 kernel: audit: type=1300 audit(1747442494.796:640): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f8e06d01188 items=0 ppid=2419 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:34.818351 kernel: audit: type=1327 audit(1747442494.796:640): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264343338373933336331373666323063623964396631666533393963 May 17 00:41:34.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264343338373933336331373666323063623964396631666533393963 May 17 00:41:34.796000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.842372 kernel: audit: type=1400 audit(1747442494.796:641): avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.842507 kernel: audit: type=1400 audit(1747442494.796:641): avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.796000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.850646 kernel: audit: type=1400 audit(1747442494.796:641): avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.796000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.796000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.865462 kernel: audit: type=1400 audit(1747442494.796:641): avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.867856 kernel: audit: type=1400 audit(1747442494.796:641): avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.796000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.796000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.876440 kernel: audit: type=1400 audit(1747442494.796:641): avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.876568 kernel: audit: type=1400 audit(1747442494.796:641): avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.796000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.796000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.796000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.796000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.796000 audit: BPF prog-id=98 op=LOAD May 17 00:41:34.796000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c000114898 items=0 ppid=2419 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:34.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264343338373933336331373666323063623964396631666533393963 May 17 00:41:34.820000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.820000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.820000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.820000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.820000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.820000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.820000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.820000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.820000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.820000 audit: BPF prog-id=99 op=LOAD May 17 00:41:34.820000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c0001148e8 items=0 ppid=2419 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:34.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264343338373933336331373666323063623964396631666533393963 May 17 00:41:34.844000 audit: BPF prog-id=99 op=UNLOAD May 17 00:41:34.844000 audit: BPF prog-id=98 op=UNLOAD May 17 00:41:34.844000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.844000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.844000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.844000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.844000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.844000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.844000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.844000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.844000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.844000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:34.844000 audit: BPF prog-id=100 op=LOAD May 17 00:41:34.844000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c000114978 items=0 ppid=2419 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:34.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264343338373933336331373666323063623964396631666533393963 May 17 00:41:34.949719 env[1209]: time="2025-05-17T00:41:34.949620082Z" level=info msg="StartContainer for \"bd4387933c176f20cb9d9f1fe399cb475a33234b430037aff51efc75066d04f7\" returns successfully" May 17 00:41:34.951321 env[1209]: time="2025-05-17T00:41:34.951285636Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:41:35.599623 kubelet[1454]: E0517 00:41:35.599240 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:36.271549 env[1209]: time="2025-05-17T00:41:36.258802366Z" level=info msg="StopPodSandbox for \"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7\"" May 17 00:41:36.505798 env[1209]: 2025-05-17 00:41:36.409 [INFO][2509] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" May 17 00:41:36.505798 env[1209]: 2025-05-17 00:41:36.410 [INFO][2509] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" iface="eth0" netns="/var/run/netns/cni-6f60941f-8f14-fae0-6027-e2f3b96b5cda" May 17 00:41:36.505798 env[1209]: 2025-05-17 00:41:36.410 [INFO][2509] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" iface="eth0" netns="/var/run/netns/cni-6f60941f-8f14-fae0-6027-e2f3b96b5cda" May 17 00:41:36.505798 env[1209]: 2025-05-17 00:41:36.410 [INFO][2509] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" iface="eth0" netns="/var/run/netns/cni-6f60941f-8f14-fae0-6027-e2f3b96b5cda" May 17 00:41:36.505798 env[1209]: 2025-05-17 00:41:36.410 [INFO][2509] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" May 17 00:41:36.505798 env[1209]: 2025-05-17 00:41:36.410 [INFO][2509] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" May 17 00:41:36.505798 env[1209]: 2025-05-17 00:41:36.458 [INFO][2517] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" HandleID="k8s-pod-network.5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" Workload="10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0" May 17 00:41:36.505798 env[1209]: 2025-05-17 00:41:36.458 [INFO][2517] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:36.505798 env[1209]: 2025-05-17 00:41:36.458 [INFO][2517] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:36.505798 env[1209]: 2025-05-17 00:41:36.479 [WARNING][2517] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" HandleID="k8s-pod-network.5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" Workload="10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0" May 17 00:41:36.505798 env[1209]: 2025-05-17 00:41:36.479 [INFO][2517] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" HandleID="k8s-pod-network.5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" Workload="10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0" May 17 00:41:36.505798 env[1209]: 2025-05-17 00:41:36.489 [INFO][2517] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:36.505798 env[1209]: 2025-05-17 00:41:36.494 [INFO][2509] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" May 17 00:41:36.502124 systemd[1]: run-netns-cni\x2d6f60941f\x2d8f14\x2dfae0\x2d6027\x2de2f3b96b5cda.mount: Deactivated successfully. May 17 00:41:36.523654 env[1209]: time="2025-05-17T00:41:36.514999218Z" level=info msg="TearDown network for sandbox \"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7\" successfully" May 17 00:41:36.523654 env[1209]: time="2025-05-17T00:41:36.518594467Z" level=info msg="StopPodSandbox for \"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7\" returns successfully" May 17 00:41:36.527273 env[1209]: time="2025-05-17T00:41:36.524929293Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-96gg6,Uid:8e2cac36-6823-42b7-9b3d-26594b09e84f,Namespace:default,Attempt:1,}" May 17 00:41:36.605816 kubelet[1454]: E0517 00:41:36.600612 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:37.047137 systemd-networkd[1024]: cali24453772a19: Link UP May 17 00:41:37.055020 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:41:37.055239 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali24453772a19: link becomes ready May 17 00:41:37.057049 systemd-networkd[1024]: cali24453772a19: Gained carrier May 17 00:41:37.103656 env[1209]: 2025-05-17 00:41:36.761 [INFO][2527] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0 nginx-deployment-7fcdb87857- default 8e2cac36-6823-42b7-9b3d-26594b09e84f 1283 0 2025-05-17 00:41:20 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.142 nginx-deployment-7fcdb87857-96gg6 eth0 default [] [] [kns.default ksa.default.default] cali24453772a19 [] [] }} ContainerID="684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7" Namespace="default" Pod="nginx-deployment-7fcdb87857-96gg6" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-" May 17 00:41:37.103656 env[1209]: 2025-05-17 00:41:36.761 [INFO][2527] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7" Namespace="default" Pod="nginx-deployment-7fcdb87857-96gg6" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0" May 17 00:41:37.103656 env[1209]: 2025-05-17 00:41:36.843 [INFO][2542] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7" HandleID="k8s-pod-network.684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7" Workload="10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0" May 17 00:41:37.103656 env[1209]: 2025-05-17 00:41:36.848 [INFO][2542] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7" HandleID="k8s-pod-network.684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7" Workload="10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00023d970), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.142", "pod":"nginx-deployment-7fcdb87857-96gg6", "timestamp":"2025-05-17 00:41:36.843915021 +0000 UTC"}, Hostname:"10.0.0.142", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:41:37.103656 env[1209]: 2025-05-17 00:41:36.850 [INFO][2542] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:37.103656 env[1209]: 2025-05-17 00:41:36.852 [INFO][2542] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:37.103656 env[1209]: 2025-05-17 00:41:36.854 [INFO][2542] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.142' May 17 00:41:37.103656 env[1209]: 2025-05-17 00:41:36.919 [INFO][2542] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7" host="10.0.0.142" May 17 00:41:37.103656 env[1209]: 2025-05-17 00:41:36.950 [INFO][2542] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.142" May 17 00:41:37.103656 env[1209]: 2025-05-17 00:41:36.969 [INFO][2542] ipam/ipam.go 511: Trying affinity for 192.168.25.128/26 host="10.0.0.142" May 17 00:41:37.103656 env[1209]: 2025-05-17 00:41:36.973 [INFO][2542] ipam/ipam.go 158: Attempting to load block cidr=192.168.25.128/26 host="10.0.0.142" May 17 00:41:37.103656 env[1209]: 2025-05-17 00:41:36.995 [INFO][2542] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.25.128/26 host="10.0.0.142" May 17 00:41:37.103656 env[1209]: 2025-05-17 00:41:36.995 [INFO][2542] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.25.128/26 handle="k8s-pod-network.684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7" host="10.0.0.142" May 17 00:41:37.103656 env[1209]: 2025-05-17 00:41:36.999 [INFO][2542] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7 May 17 00:41:37.103656 env[1209]: 2025-05-17 00:41:37.012 [INFO][2542] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.25.128/26 handle="k8s-pod-network.684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7" host="10.0.0.142" May 17 00:41:37.103656 env[1209]: 2025-05-17 00:41:37.029 [INFO][2542] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.25.130/26] block=192.168.25.128/26 handle="k8s-pod-network.684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7" host="10.0.0.142" May 17 00:41:37.103656 env[1209]: 2025-05-17 00:41:37.030 [INFO][2542] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.25.130/26] handle="k8s-pod-network.684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7" host="10.0.0.142" May 17 00:41:37.103656 env[1209]: 2025-05-17 00:41:37.030 [INFO][2542] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:37.103656 env[1209]: 2025-05-17 00:41:37.030 [INFO][2542] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.25.130/26] IPv6=[] ContainerID="684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7" HandleID="k8s-pod-network.684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7" Workload="10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0" May 17 00:41:37.104513 env[1209]: 2025-05-17 00:41:37.036 [INFO][2527] cni-plugin/k8s.go 418: Populated endpoint ContainerID="684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7" Namespace="default" Pod="nginx-deployment-7fcdb87857-96gg6" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"8e2cac36-6823-42b7-9b3d-26594b09e84f", ResourceVersion:"1283", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-96gg6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali24453772a19", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:37.104513 env[1209]: 2025-05-17 00:41:37.036 [INFO][2527] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.25.130/32] ContainerID="684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7" Namespace="default" Pod="nginx-deployment-7fcdb87857-96gg6" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0" May 17 00:41:37.104513 env[1209]: 2025-05-17 00:41:37.036 [INFO][2527] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali24453772a19 ContainerID="684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7" Namespace="default" Pod="nginx-deployment-7fcdb87857-96gg6" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0" May 17 00:41:37.104513 env[1209]: 2025-05-17 00:41:37.062 [INFO][2527] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7" Namespace="default" Pod="nginx-deployment-7fcdb87857-96gg6" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0" May 17 00:41:37.104513 env[1209]: 2025-05-17 00:41:37.063 [INFO][2527] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7" Namespace="default" Pod="nginx-deployment-7fcdb87857-96gg6" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"8e2cac36-6823-42b7-9b3d-26594b09e84f", ResourceVersion:"1283", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7", Pod:"nginx-deployment-7fcdb87857-96gg6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali24453772a19", MAC:"ba:79:c2:e4:c6:25", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:37.104513 env[1209]: 2025-05-17 00:41:37.098 [INFO][2527] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7" Namespace="default" Pod="nginx-deployment-7fcdb87857-96gg6" WorkloadEndpoint="10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0" May 17 00:41:37.112000 audit[2564]: NETFILTER_CFG table=filter:78 family=2 entries=42 op=nft_register_chain pid=2564 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:37.112000 audit[2564]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffe25659ae0 a2=0 a3=7ffe25659acc items=0 ppid=2159 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:37.112000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:37.142841 env[1209]: time="2025-05-17T00:41:37.136146559Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:41:37.142841 env[1209]: time="2025-05-17T00:41:37.136185243Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:41:37.142841 env[1209]: time="2025-05-17T00:41:37.136196874Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:41:37.142841 env[1209]: time="2025-05-17T00:41:37.136331761Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7 pid=2571 runtime=io.containerd.runc.v2 May 17 00:41:37.257998 systemd[1]: Started cri-containerd-684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7.scope. May 17 00:41:37.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.296000 audit: BPF prog-id=101 op=LOAD May 17 00:41:37.298000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.298000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2571 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:37.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638343736346234663035316462353262643332326632316637643562 May 17 00:41:37.298000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.298000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2571 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:37.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638343736346234663035316462353262643332326632316637643562 May 17 00:41:37.298000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.298000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.298000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.298000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.298000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.298000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.298000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.298000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.298000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.298000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.298000 audit: BPF prog-id=102 op=LOAD May 17 00:41:37.298000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003a0a40 items=0 ppid=2571 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:37.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638343736346234663035316462353262643332326632316637643562 May 17 00:41:37.301000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.301000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.301000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.301000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.301000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.301000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.301000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.301000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.301000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.301000 audit: BPF prog-id=103 op=LOAD May 17 00:41:37.301000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003a0a88 items=0 ppid=2571 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:37.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638343736346234663035316462353262643332326632316637643562 May 17 00:41:37.307000 audit: BPF prog-id=103 op=UNLOAD May 17 00:41:37.307000 audit: BPF prog-id=102 op=UNLOAD May 17 00:41:37.307000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.307000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.307000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.307000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.307000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.307000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.307000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.307000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.307000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.307000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.307000 audit: BPF prog-id=104 op=LOAD May 17 00:41:37.307000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003a0e98 items=0 ppid=2571 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:37.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638343736346234663035316462353262643332326632316637643562 May 17 00:41:37.322594 systemd-resolved[1147]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:41:37.403210 env[1209]: time="2025-05-17T00:41:37.403138545Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-96gg6,Uid:8e2cac36-6823-42b7-9b3d-26594b09e84f,Namespace:default,Attempt:1,} returns sandbox id \"684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7\"" May 17 00:41:37.503983 systemd[1]: run-containerd-runc-k8s.io-684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7-runc.BzHdAv.mount: Deactivated successfully. May 17 00:41:37.602486 kubelet[1454]: E0517 00:41:37.601120 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:37.729392 env[1209]: time="2025-05-17T00:41:37.729283740Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:37.734914 env[1209]: time="2025-05-17T00:41:37.734845092Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:37.737825 env[1209]: time="2025-05-17T00:41:37.737703100Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:37.741891 env[1209]: time="2025-05-17T00:41:37.741809284Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:37.742192 env[1209]: time="2025-05-17T00:41:37.742143026Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 00:41:37.745100 env[1209]: time="2025-05-17T00:41:37.745044396Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 17 00:41:37.751780 env[1209]: time="2025-05-17T00:41:37.748925803Z" level=info msg="CreateContainer within sandbox \"d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:41:37.819094 env[1209]: time="2025-05-17T00:41:37.818568998Z" level=info msg="CreateContainer within sandbox \"d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"4fc4dd808979ae2455997649d880399c728d1ee485da18e7055914cd6516c079\"" May 17 00:41:37.826473 env[1209]: time="2025-05-17T00:41:37.824670664Z" level=info msg="StartContainer for \"4fc4dd808979ae2455997649d880399c728d1ee485da18e7055914cd6516c079\"" May 17 00:41:37.895619 systemd[1]: Started cri-containerd-4fc4dd808979ae2455997649d880399c728d1ee485da18e7055914cd6516c079.scope. May 17 00:41:37.943000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.943000 audit[2615]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f592a40bbd8 items=0 ppid=2419 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:37.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633464643830383937396165323435353939373634396438383033 May 17 00:41:37.943000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.943000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.943000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.943000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.943000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.943000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.943000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.943000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.943000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.943000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.943000 audit: BPF prog-id=105 op=LOAD May 17 00:41:37.943000 audit[2615]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a0a48 items=0 ppid=2419 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:37.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633464643830383937396165323435353939373634396438383033 May 17 00:41:37.952000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.952000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.952000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.952000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.952000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.952000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.952000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.952000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.952000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.952000 audit: BPF prog-id=106 op=LOAD May 17 00:41:37.952000 audit[2615]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000a0a98 items=0 ppid=2419 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:37.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633464643830383937396165323435353939373634396438383033 May 17 00:41:37.967000 audit: BPF prog-id=106 op=UNLOAD May 17 00:41:37.967000 audit: BPF prog-id=105 op=UNLOAD May 17 00:41:37.967000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.967000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.967000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.967000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.967000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.967000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.967000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.967000 audit[2615]: AVC avc: denied { perfmon } for pid=2615 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.967000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.967000 audit[2615]: AVC avc: denied { bpf } for pid=2615 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:37.967000 audit: BPF prog-id=107 op=LOAD May 17 00:41:37.967000 audit[2615]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000a0b28 items=0 ppid=2419 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:37.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633464643830383937396165323435353939373634396438383033 May 17 00:41:38.119669 env[1209]: time="2025-05-17T00:41:38.116641476Z" level=info msg="StartContainer for \"4fc4dd808979ae2455997649d880399c728d1ee485da18e7055914cd6516c079\" returns successfully" May 17 00:41:38.120301 kubelet[1454]: I0517 00:41:38.118650 1454 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:41:38.120301 kubelet[1454]: I0517 00:41:38.119690 1454 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:41:38.348071 systemd-networkd[1024]: cali24453772a19: Gained IPv6LL May 17 00:41:38.601388 kubelet[1454]: E0517 00:41:38.601297 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:38.637708 kubelet[1454]: I0517 00:41:38.637637 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-959dd" podStartSLOduration=33.488205038 podStartE2EDuration="38.637612313s" podCreationTimestamp="2025-05-17 00:41:00 +0000 UTC" firstStartedPulling="2025-05-17 00:41:32.594461171 +0000 UTC m=+33.894663560" lastFinishedPulling="2025-05-17 00:41:37.743868447 +0000 UTC m=+39.044070835" observedRunningTime="2025-05-17 00:41:38.626010435 +0000 UTC m=+39.926212843" watchObservedRunningTime="2025-05-17 00:41:38.637612313 +0000 UTC m=+39.937814701" May 17 00:41:39.521451 kubelet[1454]: E0517 00:41:39.521391 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:39.608000 kubelet[1454]: E0517 00:41:39.607913 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:40.615558 kubelet[1454]: E0517 00:41:40.608578 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:41.612522 kubelet[1454]: E0517 00:41:41.612406 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:41.994243 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2507424751.mount: Deactivated successfully. May 17 00:41:42.617394 kubelet[1454]: E0517 00:41:42.613714 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:43.614834 kubelet[1454]: E0517 00:41:43.614755 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:44.618155 kubelet[1454]: E0517 00:41:44.618041 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:44.829627 env[1209]: time="2025-05-17T00:41:44.828283050Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:44.840719 env[1209]: time="2025-05-17T00:41:44.840559321Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:44.845504 env[1209]: time="2025-05-17T00:41:44.845408218Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:44.850016 env[1209]: time="2025-05-17T00:41:44.849933874Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:44.851141 env[1209]: time="2025-05-17T00:41:44.851071352Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 17 00:41:44.861512 env[1209]: time="2025-05-17T00:41:44.861431205Z" level=info msg="CreateContainer within sandbox \"684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 17 00:41:44.930883 env[1209]: time="2025-05-17T00:41:44.930780422Z" level=info msg="CreateContainer within sandbox \"684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"815bf7ec6d2e35ee9a4be62cf451033e3c8eb2793e61bf665641c9518fa02a30\"" May 17 00:41:44.931469 env[1209]: time="2025-05-17T00:41:44.931428125Z" level=info msg="StartContainer for \"815bf7ec6d2e35ee9a4be62cf451033e3c8eb2793e61bf665641c9518fa02a30\"" May 17 00:41:44.973721 systemd[1]: Started cri-containerd-815bf7ec6d2e35ee9a4be62cf451033e3c8eb2793e61bf665641c9518fa02a30.scope. May 17 00:41:45.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.013347 kernel: kauditd_printk_skb: 136 callbacks suppressed May 17 00:41:45.013444 kernel: audit: type=1400 audit(1747442505.005:671): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.019605 kernel: audit: type=1400 audit(1747442505.005:672): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.031265 kernel: audit: type=1400 audit(1747442505.005:673): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.037457 kernel: audit: type=1400 audit(1747442505.005:674): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.042679 kernel: audit: type=1400 audit(1747442505.005:675): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.057797 kernel: audit: type=1400 audit(1747442505.005:676): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.060331 kernel: audit: type=1400 audit(1747442505.005:677): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.067454 kernel: audit: type=1400 audit(1747442505.005:678): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.072156 kernel: audit: type=1400 audit(1747442505.005:679): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.081560 kernel: audit: type=1400 audit(1747442505.008:680): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.008000 audit: BPF prog-id=108 op=LOAD May 17 00:41:45.009000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.009000 audit[2662]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2571 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:45.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831356266376563366432653335656539613462653632636634353130 May 17 00:41:45.009000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.009000 audit[2662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=2571 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:45.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831356266376563366432653335656539613462653632636634353130 May 17 00:41:45.009000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.009000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.009000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.009000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.009000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.009000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.009000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.009000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.009000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.009000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.009000 audit: BPF prog-id=109 op=LOAD May 17 00:41:45.009000 audit[2662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00011a5f0 items=0 ppid=2571 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:45.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831356266376563366432653335656539613462653632636634353130 May 17 00:41:45.014000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.014000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.014000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.014000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.014000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.014000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.014000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.014000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.014000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.014000 audit: BPF prog-id=110 op=LOAD May 17 00:41:45.014000 audit[2662]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00011a638 items=0 ppid=2571 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:45.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831356266376563366432653335656539613462653632636634353130 May 17 00:41:45.022000 audit: BPF prog-id=110 op=UNLOAD May 17 00:41:45.022000 audit: BPF prog-id=109 op=UNLOAD May 17 00:41:45.022000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.022000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.022000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.022000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.022000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.022000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.022000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.022000 audit[2662]: AVC avc: denied { perfmon } for pid=2662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.022000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.022000 audit[2662]: AVC avc: denied { bpf } for pid=2662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:45.022000 audit: BPF prog-id=111 op=LOAD May 17 00:41:45.022000 audit[2662]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00011aa48 items=0 ppid=2571 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:45.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831356266376563366432653335656539613462653632636634353130 May 17 00:41:45.117994 env[1209]: time="2025-05-17T00:41:45.117897593Z" level=info msg="StartContainer for \"815bf7ec6d2e35ee9a4be62cf451033e3c8eb2793e61bf665641c9518fa02a30\" returns successfully" May 17 00:41:45.618554 kubelet[1454]: E0517 00:41:45.618495 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:46.627375 kubelet[1454]: E0517 00:41:46.627198 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:47.627527 kubelet[1454]: E0517 00:41:47.627373 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:48.627918 kubelet[1454]: E0517 00:41:48.627768 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:49.628546 kubelet[1454]: E0517 00:41:49.628368 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:50.002000 audit[2713]: NETFILTER_CFG table=filter:79 family=2 entries=24 op=nft_register_rule pid=2713 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:50.002000 audit[2713]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7fff5b4720e0 a2=0 a3=7fff5b4720cc items=0 ppid=1710 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:50.002000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:50.019769 kernel: kauditd_printk_skb: 50 callbacks suppressed May 17 00:41:50.019933 kernel: audit: type=1325 audit(1747442510.012:690): table=nat:80 family=2 entries=22 op=nft_register_rule pid=2713 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:50.012000 audit[2713]: NETFILTER_CFG table=nat:80 family=2 entries=22 op=nft_register_rule pid=2713 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:50.012000 audit[2713]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff5b4720e0 a2=0 a3=0 items=0 ppid=1710 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:50.038107 kernel: audit: type=1300 audit(1747442510.012:690): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff5b4720e0 a2=0 a3=0 items=0 ppid=1710 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:50.038289 kernel: audit: type=1327 audit(1747442510.012:690): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:50.012000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:50.071000 audit[2715]: NETFILTER_CFG table=filter:81 family=2 entries=36 op=nft_register_rule pid=2715 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:50.071000 audit[2715]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffd8be69120 a2=0 a3=7ffd8be6910c items=0 ppid=1710 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:50.088265 kernel: audit: type=1325 audit(1747442510.071:691): table=filter:81 family=2 entries=36 op=nft_register_rule pid=2715 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:50.088429 kernel: audit: type=1300 audit(1747442510.071:691): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffd8be69120 a2=0 a3=7ffd8be6910c items=0 ppid=1710 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:50.093279 kernel: audit: type=1327 audit(1747442510.071:691): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:50.071000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:50.123918 kernel: audit: type=1325 audit(1747442510.090:692): table=nat:82 family=2 entries=22 op=nft_register_rule pid=2715 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:50.090000 audit[2715]: NETFILTER_CFG table=nat:82 family=2 entries=22 op=nft_register_rule pid=2715 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:50.090000 audit[2715]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd8be69120 a2=0 a3=0 items=0 ppid=1710 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:50.130285 kernel: audit: type=1300 audit(1747442510.090:692): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd8be69120 a2=0 a3=0 items=0 ppid=1710 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:50.157295 kernel: audit: type=1327 audit(1747442510.090:692): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:50.090000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:50.157636 kubelet[1454]: I0517 00:41:50.155841 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-96gg6" podStartSLOduration=22.703374558 podStartE2EDuration="30.15572378s" podCreationTimestamp="2025-05-17 00:41:20 +0000 UTC" firstStartedPulling="2025-05-17 00:41:37.404031236 +0000 UTC m=+38.704233624" lastFinishedPulling="2025-05-17 00:41:44.856380458 +0000 UTC m=+46.156582846" observedRunningTime="2025-05-17 00:41:45.65539636 +0000 UTC m=+46.955598768" watchObservedRunningTime="2025-05-17 00:41:50.15572378 +0000 UTC m=+51.455926168" May 17 00:41:50.182601 systemd[1]: Created slice kubepods-besteffort-podd75e68c0_db17_492b_84d2_33b5dec4cdd5.slice. May 17 00:41:50.283232 kubelet[1454]: I0517 00:41:50.282986 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/d75e68c0-db17-492b-84d2-33b5dec4cdd5-data\") pod \"nfs-server-provisioner-0\" (UID: \"d75e68c0-db17-492b-84d2-33b5dec4cdd5\") " pod="default/nfs-server-provisioner-0" May 17 00:41:50.283232 kubelet[1454]: I0517 00:41:50.283059 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8xb2n\" (UniqueName: \"kubernetes.io/projected/d75e68c0-db17-492b-84d2-33b5dec4cdd5-kube-api-access-8xb2n\") pod \"nfs-server-provisioner-0\" (UID: \"d75e68c0-db17-492b-84d2-33b5dec4cdd5\") " pod="default/nfs-server-provisioner-0" May 17 00:41:50.490323 env[1209]: time="2025-05-17T00:41:50.489608419Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:d75e68c0-db17-492b-84d2-33b5dec4cdd5,Namespace:default,Attempt:0,}" May 17 00:41:50.632467 kubelet[1454]: E0517 00:41:50.632378 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:50.833372 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 17 00:41:50.830108 systemd-networkd[1024]: cali60e51b789ff: Link UP May 17 00:41:50.830351 systemd-networkd[1024]: cali60e51b789ff: Gained carrier May 17 00:41:50.879263 env[1209]: 2025-05-17 00:41:50.619 [INFO][2717] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.142-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default d75e68c0-db17-492b-84d2-33b5dec4cdd5 1356 0 2025-05-17 00:41:50 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.142 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-" May 17 00:41:50.879263 env[1209]: 2025-05-17 00:41:50.619 [INFO][2717] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" May 17 00:41:50.879263 env[1209]: 2025-05-17 00:41:50.691 [INFO][2732] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae" HandleID="k8s-pod-network.26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae" Workload="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" May 17 00:41:50.879263 env[1209]: 2025-05-17 00:41:50.691 [INFO][2732] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae" HandleID="k8s-pod-network.26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae" Workload="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004f9b0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.142", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-17 00:41:50.691373295 +0000 UTC"}, Hostname:"10.0.0.142", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:41:50.879263 env[1209]: 2025-05-17 00:41:50.691 [INFO][2732] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:50.879263 env[1209]: 2025-05-17 00:41:50.691 [INFO][2732] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:50.879263 env[1209]: 2025-05-17 00:41:50.691 [INFO][2732] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.142' May 17 00:41:50.879263 env[1209]: 2025-05-17 00:41:50.717 [INFO][2732] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae" host="10.0.0.142" May 17 00:41:50.879263 env[1209]: 2025-05-17 00:41:50.739 [INFO][2732] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.142" May 17 00:41:50.879263 env[1209]: 2025-05-17 00:41:50.753 [INFO][2732] ipam/ipam.go 511: Trying affinity for 192.168.25.128/26 host="10.0.0.142" May 17 00:41:50.879263 env[1209]: 2025-05-17 00:41:50.766 [INFO][2732] ipam/ipam.go 158: Attempting to load block cidr=192.168.25.128/26 host="10.0.0.142" May 17 00:41:50.879263 env[1209]: 2025-05-17 00:41:50.780 [INFO][2732] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.25.128/26 host="10.0.0.142" May 17 00:41:50.879263 env[1209]: 2025-05-17 00:41:50.780 [INFO][2732] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.25.128/26 handle="k8s-pod-network.26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae" host="10.0.0.142" May 17 00:41:50.879263 env[1209]: 2025-05-17 00:41:50.788 [INFO][2732] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae May 17 00:41:50.879263 env[1209]: 2025-05-17 00:41:50.801 [INFO][2732] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.25.128/26 handle="k8s-pod-network.26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae" host="10.0.0.142" May 17 00:41:50.879263 env[1209]: 2025-05-17 00:41:50.818 [INFO][2732] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.25.131/26] block=192.168.25.128/26 handle="k8s-pod-network.26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae" host="10.0.0.142" May 17 00:41:50.879263 env[1209]: 2025-05-17 00:41:50.818 [INFO][2732] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.25.131/26] handle="k8s-pod-network.26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae" host="10.0.0.142" May 17 00:41:50.879263 env[1209]: 2025-05-17 00:41:50.818 [INFO][2732] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:50.879263 env[1209]: 2025-05-17 00:41:50.818 [INFO][2732] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.25.131/26] IPv6=[] ContainerID="26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae" HandleID="k8s-pod-network.26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae" Workload="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" May 17 00:41:50.880231 env[1209]: 2025-05-17 00:41:50.823 [INFO][2717] cni-plugin/k8s.go 418: Populated endpoint ContainerID="26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"d75e68c0-db17-492b-84d2-33b5dec4cdd5", ResourceVersion:"1356", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.25.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:50.880231 env[1209]: 2025-05-17 00:41:50.823 [INFO][2717] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.25.131/32] ContainerID="26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" May 17 00:41:50.880231 env[1209]: 2025-05-17 00:41:50.823 [INFO][2717] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" May 17 00:41:50.880231 env[1209]: 2025-05-17 00:41:50.825 [INFO][2717] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" May 17 00:41:50.880484 env[1209]: 2025-05-17 00:41:50.831 [INFO][2717] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"d75e68c0-db17-492b-84d2-33b5dec4cdd5", ResourceVersion:"1356", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.25.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"2a:08:20:df:64:1f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:50.880484 env[1209]: 2025-05-17 00:41:50.865 [INFO][2717] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.142-k8s-nfs--server--provisioner--0-eth0" May 17 00:41:50.931140 env[1209]: time="2025-05-17T00:41:50.930623705Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:41:50.931140 env[1209]: time="2025-05-17T00:41:50.930687855Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:41:50.931140 env[1209]: time="2025-05-17T00:41:50.930701521Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:41:50.931140 env[1209]: time="2025-05-17T00:41:50.930907199Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae pid=2757 runtime=io.containerd.runc.v2 May 17 00:41:50.930000 audit[2759]: NETFILTER_CFG table=filter:83 family=2 entries=40 op=nft_register_chain pid=2759 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:50.930000 audit[2759]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffe5fb86cd0 a2=0 a3=7ffe5fb86cbc items=0 ppid=2159 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:50.930000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:41:50.949906 kernel: audit: type=1325 audit(1747442510.930:693): table=filter:83 family=2 entries=40 op=nft_register_chain pid=2759 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:41:50.998375 systemd[1]: Started cri-containerd-26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae.scope. May 17 00:41:51.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.022000 audit: BPF prog-id=112 op=LOAD May 17 00:41:51.037000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.037000 audit[2766]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2757 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:51.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236623139366262613634313631343734373065346636326164393466 May 17 00:41:51.037000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.037000 audit[2766]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2757 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:51.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236623139366262613634313631343734373065346636326164393466 May 17 00:41:51.037000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.037000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.037000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.037000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.037000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.037000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.037000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.037000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.037000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.037000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.037000 audit: BPF prog-id=113 op=LOAD May 17 00:41:51.037000 audit[2766]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000312520 items=0 ppid=2757 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:51.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236623139366262613634313631343734373065346636326164393466 May 17 00:41:51.038000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.038000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.038000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.038000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.038000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.038000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.038000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.038000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.038000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.038000 audit: BPF prog-id=114 op=LOAD May 17 00:41:51.038000 audit[2766]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000312568 items=0 ppid=2757 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:51.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236623139366262613634313631343734373065346636326164393466 May 17 00:41:51.041000 audit: BPF prog-id=114 op=UNLOAD May 17 00:41:51.041000 audit: BPF prog-id=113 op=UNLOAD May 17 00:41:51.041000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.041000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.041000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.041000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.041000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.041000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.041000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.041000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.041000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.041000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:51.041000 audit: BPF prog-id=115 op=LOAD May 17 00:41:51.041000 audit[2766]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000312978 items=0 ppid=2757 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:51.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236623139366262613634313631343734373065346636326164393466 May 17 00:41:51.046966 systemd-resolved[1147]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:41:51.128562 env[1209]: time="2025-05-17T00:41:51.128466420Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:d75e68c0-db17-492b-84d2-33b5dec4cdd5,Namespace:default,Attempt:0,} returns sandbox id \"26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae\"" May 17 00:41:51.159287 env[1209]: time="2025-05-17T00:41:51.158321551Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 17 00:41:51.632802 kubelet[1454]: E0517 00:41:51.632683 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:51.989632 systemd-networkd[1024]: cali60e51b789ff: Gained IPv6LL May 17 00:41:52.635242 kubelet[1454]: E0517 00:41:52.632943 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:53.633903 kubelet[1454]: E0517 00:41:53.633834 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:54.635861 kubelet[1454]: E0517 00:41:54.634332 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:55.070900 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1987246683.mount: Deactivated successfully. May 17 00:41:55.636452 kubelet[1454]: E0517 00:41:55.636359 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:56.641144 kubelet[1454]: E0517 00:41:56.637186 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:57.637870 kubelet[1454]: E0517 00:41:57.637675 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:58.638948 kubelet[1454]: E0517 00:41:58.638839 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:59.154935 env[1209]: time="2025-05-17T00:41:59.148399025Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:59.154935 env[1209]: time="2025-05-17T00:41:59.154560522Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:59.157947 env[1209]: time="2025-05-17T00:41:59.157890163Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:59.163318 env[1209]: time="2025-05-17T00:41:59.163212242Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:41:59.163698 env[1209]: time="2025-05-17T00:41:59.163653512Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 17 00:41:59.178325 env[1209]: time="2025-05-17T00:41:59.178217239Z" level=info msg="CreateContainer within sandbox \"26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 17 00:41:59.211901 env[1209]: time="2025-05-17T00:41:59.211644239Z" level=info msg="CreateContainer within sandbox \"26b196bba6416147470e4f62ad94fd324e062f84f422dd3f7b3066aab24e34ae\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"7a553aff01eaf70c5a299052f4ba6fec79b056a8add047000f5f41dbb6930233\"" May 17 00:41:59.212799 env[1209]: time="2025-05-17T00:41:59.212721495Z" level=info msg="StartContainer for \"7a553aff01eaf70c5a299052f4ba6fec79b056a8add047000f5f41dbb6930233\"" May 17 00:41:59.348994 systemd[1]: Started cri-containerd-7a553aff01eaf70c5a299052f4ba6fec79b056a8add047000f5f41dbb6930233.scope. May 17 00:41:59.381424 kernel: kauditd_printk_skb: 59 callbacks suppressed May 17 00:41:59.381606 kernel: audit: type=1400 audit(1747442519.368:712): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.381634 kernel: audit: type=1400 audit(1747442519.368:713): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.385677 kernel: audit: type=1400 audit(1747442519.368:714): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.399042 kernel: audit: type=1400 audit(1747442519.368:715): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.406754 kernel: audit: type=1400 audit(1747442519.368:716): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.408657 kernel: audit: type=1400 audit(1747442519.368:717): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.420065 kernel: audit: type=1400 audit(1747442519.368:718): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.430293 kernel: audit: type=1400 audit(1747442519.368:719): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.439309 kernel: audit: type=1400 audit(1747442519.368:720): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.448987 kernel: audit: type=1400 audit(1747442519.372:721): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.372000 audit: BPF prog-id=116 op=LOAD May 17 00:41:59.374000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.374000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2757 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:59.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761353533616666303165616637306335613239393035326634626136 May 17 00:41:59.374000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.374000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=2757 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:59.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761353533616666303165616637306335613239393035326634626136 May 17 00:41:59.374000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.374000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.374000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.374000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.374000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.374000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.374000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.374000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.374000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.374000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.374000 audit: BPF prog-id=117 op=LOAD May 17 00:41:59.374000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00020bea0 items=0 ppid=2757 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:59.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761353533616666303165616637306335613239393035326634626136 May 17 00:41:59.380000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.380000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.380000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.380000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.380000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.380000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.380000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.380000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.380000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.380000 audit: BPF prog-id=118 op=LOAD May 17 00:41:59.380000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00020bee8 items=0 ppid=2757 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:59.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761353533616666303165616637306335613239393035326634626136 May 17 00:41:59.392000 audit: BPF prog-id=118 op=UNLOAD May 17 00:41:59.392000 audit: BPF prog-id=117 op=UNLOAD May 17 00:41:59.392000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.392000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.392000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.392000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.392000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.392000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.392000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.392000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.392000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.392000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:41:59.392000 audit: BPF prog-id=119 op=LOAD May 17 00:41:59.392000 audit[2808]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00024e2f8 items=0 ppid=2757 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:59.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761353533616666303165616637306335613239393035326634626136 May 17 00:41:59.482763 env[1209]: time="2025-05-17T00:41:59.482032268Z" level=info msg="StartContainer for \"7a553aff01eaf70c5a299052f4ba6fec79b056a8add047000f5f41dbb6930233\" returns successfully" May 17 00:41:59.520781 kubelet[1454]: E0517 00:41:59.520626 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:59.572334 env[1209]: time="2025-05-17T00:41:59.571707134Z" level=info msg="StopPodSandbox for \"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b\"" May 17 00:41:59.581000 audit[2846]: AVC avc: denied { search } for pid=2846 comm="rpcbind" name="crypto" dev="proc" ino=24633 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c973 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:41:59.581000 audit[2846]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f5c1b9830c0 a2=0 a3=0 items=0 ppid=2819 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c254,c973 key=(null) May 17 00:41:59.581000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 17 00:41:59.642245 kubelet[1454]: E0517 00:41:59.642172 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:41:59.652000 audit[2878]: AVC avc: denied { search } for pid=2878 comm="dbus-daemon" name="crypto" dev="proc" ino=24633 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c973 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:41:59.652000 audit[2878]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f13531d80c0 a2=0 a3=0 items=0 ppid=2819 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c254,c973 key=(null) May 17 00:41:59.652000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 17 00:41:59.671000 audit[2879]: AVC avc: denied { watch } for pid=2879 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537058 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c973 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c254,c973 tclass=dir permissive=0 May 17 00:41:59.671000 audit[2879]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=560bb7927b50 a2=2c8 a3=7ffefca30b7c items=0 ppid=2819 pid=2879 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c254,c973 key=(null) May 17 00:41:59.671000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 17 00:41:59.676000 audit[2880]: AVC avc: denied { read } for pid=2880 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23748 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c973 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 17 00:41:59.676000 audit[2880]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fea8e2e2320 a1=80000 a2=d a3=7ffdca7b8a70 items=0 ppid=2819 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c254,c973 key=(null) May 17 00:41:59.676000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 17 00:41:59.682000 audit[2880]: AVC avc: denied { search } for pid=2880 comm="ganesha.nfsd" name="crypto" dev="proc" ino=24633 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c973 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 17 00:41:59.682000 audit[2880]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fea8d8360c0 a2=0 a3=0 items=0 ppid=2819 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c254,c973 key=(null) May 17 00:41:59.682000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 17 00:41:59.769080 kubelet[1454]: I0517 00:41:59.766823 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.7513863619999999 podStartE2EDuration="9.766801321s" podCreationTimestamp="2025-05-17 00:41:50 +0000 UTC" firstStartedPulling="2025-05-17 00:41:51.150163262 +0000 UTC m=+52.450365640" lastFinishedPulling="2025-05-17 00:41:59.165578211 +0000 UTC m=+60.465780599" observedRunningTime="2025-05-17 00:41:59.759982158 +0000 UTC m=+61.060184576" watchObservedRunningTime="2025-05-17 00:41:59.766801321 +0000 UTC m=+61.067003719" May 17 00:41:59.826232 env[1209]: 2025-05-17 00:41:59.723 [WARNING][2868] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-csi--node--driver--959dd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"89a8ad48-0dd5-49a4-8e14-981634b82dde", ResourceVersion:"1298", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425", Pod:"csi-node-driver-959dd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.25.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7623b6c64aa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:41:59.826232 env[1209]: 2025-05-17 00:41:59.723 [INFO][2868] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" May 17 00:41:59.826232 env[1209]: 2025-05-17 00:41:59.723 [INFO][2868] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" iface="eth0" netns="" May 17 00:41:59.826232 env[1209]: 2025-05-17 00:41:59.724 [INFO][2868] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" May 17 00:41:59.826232 env[1209]: 2025-05-17 00:41:59.724 [INFO][2868] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" May 17 00:41:59.826232 env[1209]: 2025-05-17 00:41:59.769 [INFO][2935] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" HandleID="k8s-pod-network.cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" Workload="10.0.0.142-k8s-csi--node--driver--959dd-eth0" May 17 00:41:59.826232 env[1209]: 2025-05-17 00:41:59.769 [INFO][2935] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:41:59.826232 env[1209]: 2025-05-17 00:41:59.769 [INFO][2935] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:41:59.826232 env[1209]: 2025-05-17 00:41:59.797 [WARNING][2935] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" HandleID="k8s-pod-network.cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" Workload="10.0.0.142-k8s-csi--node--driver--959dd-eth0" May 17 00:41:59.826232 env[1209]: 2025-05-17 00:41:59.797 [INFO][2935] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" HandleID="k8s-pod-network.cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" Workload="10.0.0.142-k8s-csi--node--driver--959dd-eth0" May 17 00:41:59.826232 env[1209]: 2025-05-17 00:41:59.822 [INFO][2935] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:41:59.826232 env[1209]: 2025-05-17 00:41:59.823 [INFO][2868] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" May 17 00:41:59.826865 env[1209]: time="2025-05-17T00:41:59.826263542Z" level=info msg="TearDown network for sandbox \"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b\" successfully" May 17 00:41:59.826865 env[1209]: time="2025-05-17T00:41:59.826309899Z" level=info msg="StopPodSandbox for \"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b\" returns successfully" May 17 00:41:59.827926 env[1209]: time="2025-05-17T00:41:59.827628658Z" level=info msg="RemovePodSandbox for \"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b\"" May 17 00:41:59.817000 audit[2949]: NETFILTER_CFG table=filter:84 family=2 entries=24 op=nft_register_rule pid=2949 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:59.817000 audit[2949]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd86cce190 a2=0 a3=7ffd86cce17c items=0 ppid=1710 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:59.817000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:41:59.830705 env[1209]: time="2025-05-17T00:41:59.827945104Z" level=info msg="Forcibly stopping sandbox \"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b\"" May 17 00:41:59.844000 audit[2949]: NETFILTER_CFG table=nat:85 family=2 entries=106 op=nft_register_chain pid=2949 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:41:59.844000 audit[2949]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd86cce190 a2=0 a3=7ffd86cce17c items=0 ppid=1710 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:59.844000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:42:00.055066 env[1209]: 2025-05-17 00:41:59.984 [WARNING][2960] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-csi--node--driver--959dd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"89a8ad48-0dd5-49a4-8e14-981634b82dde", ResourceVersion:"1298", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"d7c646f170fd5efa18e93f800935913a5dd76c902f209bc8432f4c1537cdf425", Pod:"csi-node-driver-959dd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.25.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7623b6c64aa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:00.055066 env[1209]: 2025-05-17 00:41:59.984 [INFO][2960] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" May 17 00:42:00.055066 env[1209]: 2025-05-17 00:41:59.984 [INFO][2960] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" iface="eth0" netns="" May 17 00:42:00.055066 env[1209]: 2025-05-17 00:41:59.984 [INFO][2960] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" May 17 00:42:00.055066 env[1209]: 2025-05-17 00:41:59.984 [INFO][2960] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" May 17 00:42:00.055066 env[1209]: 2025-05-17 00:42:00.024 [INFO][2969] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" HandleID="k8s-pod-network.cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" Workload="10.0.0.142-k8s-csi--node--driver--959dd-eth0" May 17 00:42:00.055066 env[1209]: 2025-05-17 00:42:00.025 [INFO][2969] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:00.055066 env[1209]: 2025-05-17 00:42:00.025 [INFO][2969] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:00.055066 env[1209]: 2025-05-17 00:42:00.044 [WARNING][2969] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" HandleID="k8s-pod-network.cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" Workload="10.0.0.142-k8s-csi--node--driver--959dd-eth0" May 17 00:42:00.055066 env[1209]: 2025-05-17 00:42:00.044 [INFO][2969] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" HandleID="k8s-pod-network.cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" Workload="10.0.0.142-k8s-csi--node--driver--959dd-eth0" May 17 00:42:00.055066 env[1209]: 2025-05-17 00:42:00.049 [INFO][2969] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:00.055066 env[1209]: 2025-05-17 00:42:00.051 [INFO][2960] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b" May 17 00:42:00.055066 env[1209]: time="2025-05-17T00:42:00.054892635Z" level=info msg="TearDown network for sandbox \"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b\" successfully" May 17 00:42:00.059696 env[1209]: time="2025-05-17T00:42:00.059597212Z" level=info msg="RemovePodSandbox \"cbfc6568a212fcf20220dce47c9fd71be1b85b48b23951941cbfec1a37e5823b\" returns successfully" May 17 00:42:00.062776 env[1209]: time="2025-05-17T00:42:00.062680469Z" level=info msg="StopPodSandbox for \"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7\"" May 17 00:42:00.192913 systemd[1]: run-containerd-runc-k8s.io-4de45dd362682e513196410bc521b132e5d85cb55da3a48dbfbbede94f732579-runc.cS6H9N.mount: Deactivated successfully. May 17 00:42:00.242115 env[1209]: 2025-05-17 00:42:00.154 [WARNING][2987] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"8e2cac36-6823-42b7-9b3d-26594b09e84f", ResourceVersion:"1318", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7", Pod:"nginx-deployment-7fcdb87857-96gg6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali24453772a19", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:00.242115 env[1209]: 2025-05-17 00:42:00.154 [INFO][2987] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" May 17 00:42:00.242115 env[1209]: 2025-05-17 00:42:00.154 [INFO][2987] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" iface="eth0" netns="" May 17 00:42:00.242115 env[1209]: 2025-05-17 00:42:00.154 [INFO][2987] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" May 17 00:42:00.242115 env[1209]: 2025-05-17 00:42:00.154 [INFO][2987] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" May 17 00:42:00.242115 env[1209]: 2025-05-17 00:42:00.189 [INFO][2995] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" HandleID="k8s-pod-network.5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" Workload="10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0" May 17 00:42:00.242115 env[1209]: 2025-05-17 00:42:00.189 [INFO][2995] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:00.242115 env[1209]: 2025-05-17 00:42:00.189 [INFO][2995] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:00.242115 env[1209]: 2025-05-17 00:42:00.210 [WARNING][2995] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" HandleID="k8s-pod-network.5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" Workload="10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0" May 17 00:42:00.242115 env[1209]: 2025-05-17 00:42:00.210 [INFO][2995] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" HandleID="k8s-pod-network.5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" Workload="10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0" May 17 00:42:00.242115 env[1209]: 2025-05-17 00:42:00.213 [INFO][2995] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:00.242115 env[1209]: 2025-05-17 00:42:00.216 [INFO][2987] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" May 17 00:42:00.242115 env[1209]: time="2025-05-17T00:42:00.230324135Z" level=info msg="TearDown network for sandbox \"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7\" successfully" May 17 00:42:00.242115 env[1209]: time="2025-05-17T00:42:00.241266830Z" level=info msg="StopPodSandbox for \"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7\" returns successfully" May 17 00:42:00.246937 env[1209]: time="2025-05-17T00:42:00.245397887Z" level=info msg="RemovePodSandbox for \"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7\"" May 17 00:42:00.246937 env[1209]: time="2025-05-17T00:42:00.245454854Z" level=info msg="Forcibly stopping sandbox \"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7\"" May 17 00:42:00.429927 env[1209]: 2025-05-17 00:42:00.332 [WARNING][3014] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"8e2cac36-6823-42b7-9b3d-26594b09e84f", ResourceVersion:"1318", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"684764b4f051db52bd322f21f7d5b84784f6c683c6fcb6fffdde1288379827b7", Pod:"nginx-deployment-7fcdb87857-96gg6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali24453772a19", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:00.429927 env[1209]: 2025-05-17 00:42:00.332 [INFO][3014] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" May 17 00:42:00.429927 env[1209]: 2025-05-17 00:42:00.332 [INFO][3014] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" iface="eth0" netns="" May 17 00:42:00.429927 env[1209]: 2025-05-17 00:42:00.332 [INFO][3014] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" May 17 00:42:00.429927 env[1209]: 2025-05-17 00:42:00.332 [INFO][3014] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" May 17 00:42:00.429927 env[1209]: 2025-05-17 00:42:00.390 [INFO][3022] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" HandleID="k8s-pod-network.5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" Workload="10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0" May 17 00:42:00.429927 env[1209]: 2025-05-17 00:42:00.390 [INFO][3022] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:00.429927 env[1209]: 2025-05-17 00:42:00.390 [INFO][3022] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:00.429927 env[1209]: 2025-05-17 00:42:00.413 [WARNING][3022] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" HandleID="k8s-pod-network.5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" Workload="10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0" May 17 00:42:00.429927 env[1209]: 2025-05-17 00:42:00.413 [INFO][3022] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" HandleID="k8s-pod-network.5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" Workload="10.0.0.142-k8s-nginx--deployment--7fcdb87857--96gg6-eth0" May 17 00:42:00.429927 env[1209]: 2025-05-17 00:42:00.421 [INFO][3022] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:00.429927 env[1209]: 2025-05-17 00:42:00.423 [INFO][3014] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7" May 17 00:42:00.429927 env[1209]: time="2025-05-17T00:42:00.428614534Z" level=info msg="TearDown network for sandbox \"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7\" successfully" May 17 00:42:00.448815 env[1209]: time="2025-05-17T00:42:00.448744203Z" level=info msg="RemovePodSandbox \"5a9b240745561e32a74076c19def38524329c654d30bf837cd69cc1c06f746d7\" returns successfully" May 17 00:42:00.643245 kubelet[1454]: E0517 00:42:00.643115 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:01.643570 kubelet[1454]: E0517 00:42:01.643510 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:02.645250 kubelet[1454]: E0517 00:42:02.645145 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:03.645614 kubelet[1454]: E0517 00:42:03.645510 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:04.645824 kubelet[1454]: E0517 00:42:04.645669 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:05.646725 kubelet[1454]: E0517 00:42:05.646592 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:06.647467 kubelet[1454]: E0517 00:42:06.647382 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:07.648608 kubelet[1454]: E0517 00:42:07.648524 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:08.649109 kubelet[1454]: E0517 00:42:08.648833 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:09.392911 systemd[1]: Created slice kubepods-besteffort-pod448b770d_2919_456f_8449_86e690db21ba.slice. May 17 00:42:09.517355 kubelet[1454]: I0517 00:42:09.517164 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-86574f5e-cbad-406d-bf38-4875c503d87c\" (UniqueName: \"kubernetes.io/nfs/448b770d-2919-456f-8449-86e690db21ba-pvc-86574f5e-cbad-406d-bf38-4875c503d87c\") pod \"test-pod-1\" (UID: \"448b770d-2919-456f-8449-86e690db21ba\") " pod="default/test-pod-1" May 17 00:42:09.517355 kubelet[1454]: I0517 00:42:09.517237 1454 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dwpx9\" (UniqueName: \"kubernetes.io/projected/448b770d-2919-456f-8449-86e690db21ba-kube-api-access-dwpx9\") pod \"test-pod-1\" (UID: \"448b770d-2919-456f-8449-86e690db21ba\") " pod="default/test-pod-1" May 17 00:42:09.649658 kubelet[1454]: E0517 00:42:09.649527 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:09.653000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.657480 kernel: Failed to create system directory netfs May 17 00:42:09.657572 kernel: kauditd_printk_skb: 68 callbacks suppressed May 17 00:42:09.657603 kernel: audit: type=1400 audit(1747442529.653:737): avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.657643 kernel: Failed to create system directory netfs May 17 00:42:09.653000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.658790 kernel: audit: type=1400 audit(1747442529.653:737): avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.653000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.695783 kernel: Failed to create system directory netfs May 17 00:42:09.696113 kernel: audit: type=1400 audit(1747442529.653:737): avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.696141 kernel: Failed to create system directory netfs May 17 00:42:09.696157 kernel: audit: type=1400 audit(1747442529.653:737): avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.653000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.653000 audit[3038]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5630ed5945e0 a1=153bc a2=5630bf4b42b0 a3=5 items=0 ppid=61 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:09.653000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:42:09.718637 kernel: audit: type=1300 audit(1747442529.653:737): arch=c000003e syscall=175 success=yes exit=0 a0=5630ed5945e0 a1=153bc a2=5630bf4b42b0 a3=5 items=0 ppid=61 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:09.718797 kernel: audit: type=1327 audit(1747442529.653:737): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:42:09.727463 kernel: Failed to create system directory fscache May 17 00:42:09.727653 kernel: Failed to create system directory fscache May 17 00:42:09.727704 kernel: Failed to create system directory fscache May 17 00:42:09.727763 kernel: Failed to create system directory fscache May 17 00:42:09.728310 kernel: Failed to create system directory fscache May 17 00:42:09.719000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.736595 kernel: audit: type=1400 audit(1747442529.719:738): avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.736799 kernel: Failed to create system directory fscache May 17 00:42:09.736836 kernel: Failed to create system directory fscache May 17 00:42:09.736860 kernel: Failed to create system directory fscache May 17 00:42:09.736883 kernel: Failed to create system directory fscache May 17 00:42:09.736904 kernel: Failed to create system directory fscache May 17 00:42:09.736933 kernel: Failed to create system directory fscache May 17 00:42:09.736956 kernel: Failed to create system directory fscache May 17 00:42:09.736978 kernel: Failed to create system directory fscache May 17 00:42:09.737000 kernel: Failed to create system directory fscache May 17 00:42:09.719000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.773352 kernel: audit: type=1400 audit(1747442529.719:738): avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.773525 kernel: audit: type=1400 audit(1747442529.719:738): avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.719000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.777138 kernel: audit: type=1400 audit(1747442529.719:738): avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.719000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.719000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.719000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.719000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.719000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.719000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.719000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.719000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.719000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.719000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.719000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.719000 audit[3038]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5630ed7a99c0 a1=4c0fc a2=5630bf4b42b0 a3=5 items=0 ppid=61 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:09.719000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:42:09.784892 kernel: FS-Cache: Loaded May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.831546 kernel: Failed to create system directory sunrpc May 17 00:42:09.831647 kernel: Failed to create system directory sunrpc May 17 00:42:09.831680 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.835799 kernel: Failed to create system directory sunrpc May 17 00:42:09.835947 kernel: Failed to create system directory sunrpc May 17 00:42:09.835973 kernel: Failed to create system directory sunrpc May 17 00:42:09.844050 kernel: Failed to create system directory sunrpc May 17 00:42:09.844249 kernel: Failed to create system directory sunrpc May 17 00:42:09.844273 kernel: Failed to create system directory sunrpc May 17 00:42:09.844304 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.845469 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.850783 kernel: Failed to create system directory sunrpc May 17 00:42:09.850951 kernel: Failed to create system directory sunrpc May 17 00:42:09.850985 kernel: Failed to create system directory sunrpc May 17 00:42:09.851018 kernel: Failed to create system directory sunrpc May 17 00:42:09.851038 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.867832 kernel: Failed to create system directory sunrpc May 17 00:42:09.868028 kernel: Failed to create system directory sunrpc May 17 00:42:09.868059 kernel: Failed to create system directory sunrpc May 17 00:42:09.868082 kernel: Failed to create system directory sunrpc May 17 00:42:09.868104 kernel: Failed to create system directory sunrpc May 17 00:42:09.868125 kernel: Failed to create system directory sunrpc May 17 00:42:09.868148 kernel: Failed to create system directory sunrpc May 17 00:42:09.868175 kernel: Failed to create system directory sunrpc May 17 00:42:09.872779 kernel: Failed to create system directory sunrpc May 17 00:42:09.872960 kernel: Failed to create system directory sunrpc May 17 00:42:09.872992 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.888836 kernel: Failed to create system directory sunrpc May 17 00:42:09.889024 kernel: Failed to create system directory sunrpc May 17 00:42:09.889067 kernel: Failed to create system directory sunrpc May 17 00:42:09.889100 kernel: Failed to create system directory sunrpc May 17 00:42:09.889125 kernel: Failed to create system directory sunrpc May 17 00:42:09.889163 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.890527 kernel: Failed to create system directory sunrpc May 17 00:42:09.890589 kernel: Failed to create system directory sunrpc May 17 00:42:09.892418 kernel: Failed to create system directory sunrpc May 17 00:42:09.892484 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.894312 kernel: Failed to create system directory sunrpc May 17 00:42:09.894373 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.896232 kernel: Failed to create system directory sunrpc May 17 00:42:09.896306 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.898772 kernel: Failed to create system directory sunrpc May 17 00:42:09.898839 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.900062 kernel: Failed to create system directory sunrpc May 17 00:42:09.900172 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.904642 kernel: Failed to create system directory sunrpc May 17 00:42:09.904818 kernel: Failed to create system directory sunrpc May 17 00:42:09.905621 kernel: Failed to create system directory sunrpc May 17 00:42:09.906629 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.908571 kernel: Failed to create system directory sunrpc May 17 00:42:09.908651 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.910551 kernel: Failed to create system directory sunrpc May 17 00:42:09.910776 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.912435 kernel: Failed to create system directory sunrpc May 17 00:42:09.912490 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.914368 kernel: Failed to create system directory sunrpc May 17 00:42:09.914441 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.916356 kernel: Failed to create system directory sunrpc May 17 00:42:09.916431 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.918251 kernel: Failed to create system directory sunrpc May 17 00:42:09.918401 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.920226 kernel: Failed to create system directory sunrpc May 17 00:42:09.920428 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.922196 kernel: Failed to create system directory sunrpc May 17 00:42:09.922246 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.923078 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.923952 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.924830 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.926649 kernel: Failed to create system directory sunrpc May 17 00:42:09.926700 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.928642 kernel: Failed to create system directory sunrpc May 17 00:42:09.928754 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.930486 kernel: Failed to create system directory sunrpc May 17 00:42:09.930534 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.931361 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.932196 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.933053 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.934876 kernel: Failed to create system directory sunrpc May 17 00:42:09.934936 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.936817 kernel: Failed to create system directory sunrpc May 17 00:42:09.936883 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.939413 kernel: Failed to create system directory sunrpc May 17 00:42:09.939468 kernel: Failed to create system directory sunrpc May 17 00:42:09.939524 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.941071 kernel: Failed to create system directory sunrpc May 17 00:42:09.941122 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.943529 kernel: Failed to create system directory sunrpc May 17 00:42:09.943713 kernel: Failed to create system directory sunrpc May 17 00:42:09.943806 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.944425 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.945267 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.946112 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.950804 kernel: Failed to create system directory sunrpc May 17 00:42:09.951142 kernel: Failed to create system directory sunrpc May 17 00:42:09.951180 kernel: Failed to create system directory sunrpc May 17 00:42:09.951237 kernel: Failed to create system directory sunrpc May 17 00:42:09.951271 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.952867 kernel: Failed to create system directory sunrpc May 17 00:42:09.952936 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.955675 kernel: Failed to create system directory sunrpc May 17 00:42:09.955758 kernel: Failed to create system directory sunrpc May 17 00:42:09.955790 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.957690 kernel: Failed to create system directory sunrpc May 17 00:42:09.957778 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.959716 kernel: Failed to create system directory sunrpc May 17 00:42:09.959791 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.961641 kernel: Failed to create system directory sunrpc May 17 00:42:09.961691 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.963614 kernel: Failed to create system directory sunrpc May 17 00:42:09.963679 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.965586 kernel: Failed to create system directory sunrpc May 17 00:42:09.965652 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.967596 kernel: Failed to create system directory sunrpc May 17 00:42:09.967643 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.969645 kernel: Failed to create system directory sunrpc May 17 00:42:09.969708 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.971632 kernel: Failed to create system directory sunrpc May 17 00:42:09.971692 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.973547 kernel: Failed to create system directory sunrpc May 17 00:42:09.973610 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.975428 kernel: Failed to create system directory sunrpc May 17 00:42:09.975498 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.977442 kernel: Failed to create system directory sunrpc May 17 00:42:09.977507 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.981203 kernel: Failed to create system directory sunrpc May 17 00:42:09.981423 kernel: Failed to create system directory sunrpc May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.815000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:09.998857 kernel: RPC: Registered named UNIX socket transport module. May 17 00:42:09.999011 kernel: RPC: Registered udp transport module. May 17 00:42:09.999076 kernel: RPC: Registered tcp transport module. May 17 00:42:09.999828 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 17 00:42:09.815000 audit[3038]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5630ed7f5ad0 a1=1a814c a2=5630bf4b42b0 a3=5 items=6 ppid=61 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:09.815000 audit: CWD cwd="/" May 17 00:42:09.815000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:09.815000 audit: PATH item=1 name=(null) inode=24786 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:09.815000 audit: PATH item=2 name=(null) inode=24786 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:09.815000 audit: PATH item=3 name=(null) inode=24787 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:09.815000 audit: PATH item=4 name=(null) inode=24786 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:09.815000 audit: PATH item=5 name=(null) inode=24788 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:42:09.815000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:42:10.061585 kernel: Failed to create system directory nfs May 17 00:42:10.061824 kernel: Failed to create system directory nfs May 17 00:42:10.061858 kernel: Failed to create system directory nfs May 17 00:42:10.063425 kernel: Failed to create system directory nfs May 17 00:42:10.063474 kernel: Failed to create system directory nfs May 17 00:42:10.064343 kernel: Failed to create system directory nfs May 17 00:42:10.066252 kernel: Failed to create system directory nfs May 17 00:42:10.066305 kernel: Failed to create system directory nfs May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.069781 kernel: Failed to create system directory nfs May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.071487 kernel: Failed to create system directory nfs May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.078788 kernel: Failed to create system directory nfs May 17 00:42:10.079002 kernel: Failed to create system directory nfs May 17 00:42:10.079776 kernel: Failed to create system directory nfs May 17 00:42:10.081665 kernel: Failed to create system directory nfs May 17 00:42:10.081744 kernel: Failed to create system directory nfs May 17 00:42:10.083584 kernel: Failed to create system directory nfs May 17 00:42:10.083643 kernel: Failed to create system directory nfs May 17 00:42:10.084502 kernel: Failed to create system directory nfs May 17 00:42:10.086448 kernel: Failed to create system directory nfs May 17 00:42:10.086548 kernel: Failed to create system directory nfs May 17 00:42:10.088314 kernel: Failed to create system directory nfs May 17 00:42:10.088377 kernel: Failed to create system directory nfs May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.090934 kernel: Failed to create system directory nfs May 17 00:42:10.092045 kernel: Failed to create system directory nfs May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.099482 kernel: Failed to create system directory nfs May 17 00:42:10.099631 kernel: Failed to create system directory nfs May 17 00:42:10.099650 kernel: Failed to create system directory nfs May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.101419 kernel: Failed to create system directory nfs May 17 00:42:10.101472 kernel: Failed to create system directory nfs May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.104858 kernel: Failed to create system directory nfs May 17 00:42:10.104985 kernel: Failed to create system directory nfs May 17 00:42:10.105003 kernel: Failed to create system directory nfs May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.106026 kernel: Failed to create system directory nfs May 17 00:42:10.106082 kernel: Failed to create system directory nfs May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.111385 kernel: Failed to create system directory nfs May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.112610 kernel: Failed to create system directory nfs May 17 00:42:10.112663 kernel: Failed to create system directory nfs May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.114483 kernel: Failed to create system directory nfs May 17 00:42:10.114541 kernel: Failed to create system directory nfs May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.116366 kernel: Failed to create system directory nfs May 17 00:42:10.116524 kernel: Failed to create system directory nfs May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.118171 kernel: Failed to create system directory nfs May 17 00:42:10.118217 kernel: Failed to create system directory nfs May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.119494 kernel: Failed to create system directory nfs May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.122986 kernel: Failed to create system directory nfs May 17 00:42:10.123115 kernel: Failed to create system directory nfs May 17 00:42:10.123181 kernel: Failed to create system directory nfs May 17 00:42:10.123226 kernel: Failed to create system directory nfs May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.124763 kernel: Failed to create system directory nfs May 17 00:42:10.124852 kernel: Failed to create system directory nfs May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.126566 kernel: Failed to create system directory nfs May 17 00:42:10.126612 kernel: Failed to create system directory nfs May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.128482 kernel: Failed to create system directory nfs May 17 00:42:10.128527 kernel: Failed to create system directory nfs May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.132825 kernel: Failed to create system directory nfs May 17 00:42:10.132907 kernel: Failed to create system directory nfs May 17 00:42:10.132929 kernel: Failed to create system directory nfs May 17 00:42:10.132949 kernel: Failed to create system directory nfs May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.134129 kernel: Failed to create system directory nfs May 17 00:42:10.134211 kernel: Failed to create system directory nfs May 17 00:42:10.046000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.046000 audit[3038]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5630eda16a10 a1=16eae4 a2=5630bf4b42b0 a3=5 items=0 ppid=61 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:10.046000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:42:10.171789 kernel: FS-Cache: Netfs 'nfs' registered for caching May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.224789 kernel: Failed to create system directory nfs4 May 17 00:42:10.224957 kernel: Failed to create system directory nfs4 May 17 00:42:10.224980 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.226789 kernel: Failed to create system directory nfs4 May 17 00:42:10.226832 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.229579 kernel: Failed to create system directory nfs4 May 17 00:42:10.229624 kernel: Failed to create system directory nfs4 May 17 00:42:10.229642 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.230853 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.232339 kernel: Failed to create system directory nfs4 May 17 00:42:10.232384 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.234307 kernel: Failed to create system directory nfs4 May 17 00:42:10.234363 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.236237 kernel: Failed to create system directory nfs4 May 17 00:42:10.236347 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.238229 kernel: Failed to create system directory nfs4 May 17 00:42:10.238310 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.240128 kernel: Failed to create system directory nfs4 May 17 00:42:10.240212 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.242099 kernel: Failed to create system directory nfs4 May 17 00:42:10.242239 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.244056 kernel: Failed to create system directory nfs4 May 17 00:42:10.244131 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.246006 kernel: Failed to create system directory nfs4 May 17 00:42:10.246067 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.247943 kernel: Failed to create system directory nfs4 May 17 00:42:10.248001 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.249891 kernel: Failed to create system directory nfs4 May 17 00:42:10.249943 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.251924 kernel: Failed to create system directory nfs4 May 17 00:42:10.252001 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.253006 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.254881 kernel: Failed to create system directory nfs4 May 17 00:42:10.254924 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.256835 kernel: Failed to create system directory nfs4 May 17 00:42:10.256894 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.258781 kernel: Failed to create system directory nfs4 May 17 00:42:10.258837 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.259815 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.261645 kernel: Failed to create system directory nfs4 May 17 00:42:10.261689 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.263617 kernel: Failed to create system directory nfs4 May 17 00:42:10.263676 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.267765 kernel: Failed to create system directory nfs4 May 17 00:42:10.267850 kernel: Failed to create system directory nfs4 May 17 00:42:10.267873 kernel: Failed to create system directory nfs4 May 17 00:42:10.267911 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.269440 kernel: Failed to create system directory nfs4 May 17 00:42:10.269495 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.271363 kernel: Failed to create system directory nfs4 May 17 00:42:10.271434 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.273341 kernel: Failed to create system directory nfs4 May 17 00:42:10.273456 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.275411 kernel: Failed to create system directory nfs4 May 17 00:42:10.275467 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.277343 kernel: Failed to create system directory nfs4 May 17 00:42:10.277397 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.279185 kernel: Failed to create system directory nfs4 May 17 00:42:10.279249 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.281034 kernel: Failed to create system directory nfs4 May 17 00:42:10.281132 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.282933 kernel: Failed to create system directory nfs4 May 17 00:42:10.283006 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.284846 kernel: Failed to create system directory nfs4 May 17 00:42:10.285021 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.287618 kernel: Failed to create system directory nfs4 May 17 00:42:10.287700 kernel: Failed to create system directory nfs4 May 17 00:42:10.287744 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.289586 kernel: Failed to create system directory nfs4 May 17 00:42:10.289677 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.291422 kernel: Failed to create system directory nfs4 May 17 00:42:10.291483 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.292418 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.293353 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.295259 kernel: Failed to create system directory nfs4 May 17 00:42:10.295362 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.297210 kernel: Failed to create system directory nfs4 May 17 00:42:10.297260 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.299143 kernel: Failed to create system directory nfs4 May 17 00:42:10.299222 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.301125 kernel: Failed to create system directory nfs4 May 17 00:42:10.301198 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.303038 kernel: Failed to create system directory nfs4 May 17 00:42:10.303099 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.304952 kernel: Failed to create system directory nfs4 May 17 00:42:10.305000 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.306874 kernel: Failed to create system directory nfs4 May 17 00:42:10.306922 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.308773 kernel: Failed to create system directory nfs4 May 17 00:42:10.308869 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.310765 kernel: Failed to create system directory nfs4 May 17 00:42:10.310854 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.312640 kernel: Failed to create system directory nfs4 May 17 00:42:10.312742 kernel: Failed to create system directory nfs4 May 17 00:42:10.206000 audit[3044]: AVC avc: denied { confidentiality } for pid=3044 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.521406 kernel: NFS: Registering the id_resolver key type May 17 00:42:10.522035 kernel: Key type id_resolver registered May 17 00:42:10.522071 kernel: Key type id_legacy registered May 17 00:42:10.206000 audit[3044]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f4e5585f010 a1=209404 a2=55be2193b2b0 a3=5 items=0 ppid=61 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:10.206000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.547374 kernel: Failed to create system directory rpcgss May 17 00:42:10.547469 kernel: Failed to create system directory rpcgss May 17 00:42:10.549777 kernel: Failed to create system directory rpcgss May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.551682 kernel: Failed to create system directory rpcgss May 17 00:42:10.551748 kernel: Failed to create system directory rpcgss May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.553621 kernel: Failed to create system directory rpcgss May 17 00:42:10.553658 kernel: Failed to create system directory rpcgss May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.555560 kernel: Failed to create system directory rpcgss May 17 00:42:10.555608 kernel: Failed to create system directory rpcgss May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.557477 kernel: Failed to create system directory rpcgss May 17 00:42:10.557519 kernel: Failed to create system directory rpcgss May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.559412 kernel: Failed to create system directory rpcgss May 17 00:42:10.559453 kernel: Failed to create system directory rpcgss May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.561391 kernel: Failed to create system directory rpcgss May 17 00:42:10.561444 kernel: Failed to create system directory rpcgss May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.563379 kernel: Failed to create system directory rpcgss May 17 00:42:10.563425 kernel: Failed to create system directory rpcgss May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.565348 kernel: Failed to create system directory rpcgss May 17 00:42:10.565398 kernel: Failed to create system directory rpcgss May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.567533 kernel: Failed to create system directory rpcgss May 17 00:42:10.567587 kernel: Failed to create system directory rpcgss May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.569492 kernel: Failed to create system directory rpcgss May 17 00:42:10.569680 kernel: Failed to create system directory rpcgss May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.571594 kernel: Failed to create system directory rpcgss May 17 00:42:10.571659 kernel: Failed to create system directory rpcgss May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.539000 audit[3046]: AVC avc: denied { confidentiality } for pid=3046 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:42:10.573545 kernel: Failed to create system directory rpcgss May 17 00:42:10.539000 audit[3046]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fc8e81f3010 a1=70b64 a2=55dcde9c52b0 a3=5 items=0 ppid=61 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:10.539000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 17 00:42:10.602174 nfsidmap[3052]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 17 00:42:10.606804 nfsidmap[3055]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 17 00:42:10.633000 audit[1275]: AVC avc: denied { watch_reads } for pid=1275 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:42:10.633000 audit[1275]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56548efae350 a2=10 a3=e44aa7bb39dd260d items=0 ppid=1 pid=1275 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:10.633000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:42:10.633000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:42:10.633000 audit[1275]: AVC avc: denied { watch_reads } for pid=1275 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:42:10.633000 audit[1275]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56548efae350 a2=10 a3=e44aa7bb39dd260d items=0 ppid=1 pid=1275 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:10.633000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:42:10.633000 audit[1275]: AVC avc: denied { watch_reads } for pid=1275 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:42:10.633000 audit[1275]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56548efae350 a2=10 a3=e44aa7bb39dd260d items=0 ppid=1 pid=1275 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:10.633000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:42:10.633000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:42:10.633000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:42:10.650002 kubelet[1454]: E0517 00:42:10.649933 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:10.903826 env[1209]: time="2025-05-17T00:42:10.903673222Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:448b770d-2919-456f-8449-86e690db21ba,Namespace:default,Attempt:0,}" May 17 00:42:11.160541 systemd-networkd[1024]: cali5ec59c6bf6e: Link UP May 17 00:42:11.167710 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:42:11.168194 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 17 00:42:11.177818 systemd-networkd[1024]: cali5ec59c6bf6e: Gained carrier May 17 00:42:11.198353 env[1209]: 2025-05-17 00:42:11.006 [INFO][3062] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.142-k8s-test--pod--1-eth0 default 448b770d-2919-456f-8449-86e690db21ba 1445 0 2025-05-17 00:41:50 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.142 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-" May 17 00:42:11.198353 env[1209]: 2025-05-17 00:42:11.006 [INFO][3062] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-eth0" May 17 00:42:11.198353 env[1209]: 2025-05-17 00:42:11.051 [INFO][3072] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86" HandleID="k8s-pod-network.4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86" Workload="10.0.0.142-k8s-test--pod--1-eth0" May 17 00:42:11.198353 env[1209]: 2025-05-17 00:42:11.051 [INFO][3072] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86" HandleID="k8s-pod-network.4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86" Workload="10.0.0.142-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001a45a0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.142", "pod":"test-pod-1", "timestamp":"2025-05-17 00:42:11.051046973 +0000 UTC"}, Hostname:"10.0.0.142", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:42:11.198353 env[1209]: 2025-05-17 00:42:11.051 [INFO][3072] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:42:11.198353 env[1209]: 2025-05-17 00:42:11.051 [INFO][3072] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:42:11.198353 env[1209]: 2025-05-17 00:42:11.051 [INFO][3072] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.142' May 17 00:42:11.198353 env[1209]: 2025-05-17 00:42:11.063 [INFO][3072] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86" host="10.0.0.142" May 17 00:42:11.198353 env[1209]: 2025-05-17 00:42:11.073 [INFO][3072] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.142" May 17 00:42:11.198353 env[1209]: 2025-05-17 00:42:11.090 [INFO][3072] ipam/ipam.go 511: Trying affinity for 192.168.25.128/26 host="10.0.0.142" May 17 00:42:11.198353 env[1209]: 2025-05-17 00:42:11.104 [INFO][3072] ipam/ipam.go 158: Attempting to load block cidr=192.168.25.128/26 host="10.0.0.142" May 17 00:42:11.198353 env[1209]: 2025-05-17 00:42:11.107 [INFO][3072] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.25.128/26 host="10.0.0.142" May 17 00:42:11.198353 env[1209]: 2025-05-17 00:42:11.107 [INFO][3072] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.25.128/26 handle="k8s-pod-network.4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86" host="10.0.0.142" May 17 00:42:11.198353 env[1209]: 2025-05-17 00:42:11.116 [INFO][3072] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86 May 17 00:42:11.198353 env[1209]: 2025-05-17 00:42:11.133 [INFO][3072] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.25.128/26 handle="k8s-pod-network.4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86" host="10.0.0.142" May 17 00:42:11.198353 env[1209]: 2025-05-17 00:42:11.143 [INFO][3072] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.25.132/26] block=192.168.25.128/26 handle="k8s-pod-network.4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86" host="10.0.0.142" May 17 00:42:11.198353 env[1209]: 2025-05-17 00:42:11.144 [INFO][3072] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.25.132/26] handle="k8s-pod-network.4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86" host="10.0.0.142" May 17 00:42:11.198353 env[1209]: 2025-05-17 00:42:11.144 [INFO][3072] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:42:11.198353 env[1209]: 2025-05-17 00:42:11.144 [INFO][3072] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.25.132/26] IPv6=[] ContainerID="4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86" HandleID="k8s-pod-network.4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86" Workload="10.0.0.142-k8s-test--pod--1-eth0" May 17 00:42:11.198353 env[1209]: 2025-05-17 00:42:11.146 [INFO][3062] cni-plugin/k8s.go 418: Populated endpoint ContainerID="4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"448b770d-2919-456f-8449-86e690db21ba", ResourceVersion:"1445", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:11.199579 env[1209]: 2025-05-17 00:42:11.146 [INFO][3062] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.25.132/32] ContainerID="4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-eth0" May 17 00:42:11.199579 env[1209]: 2025-05-17 00:42:11.146 [INFO][3062] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-eth0" May 17 00:42:11.199579 env[1209]: 2025-05-17 00:42:11.163 [INFO][3062] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-eth0" May 17 00:42:11.199579 env[1209]: 2025-05-17 00:42:11.180 [INFO][3062] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.142-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"448b770d-2919-456f-8449-86e690db21ba", ResourceVersion:"1445", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 41, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.142", ContainerID:"4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"02:21:53:a5:d2:1d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:42:11.199579 env[1209]: 2025-05-17 00:42:11.192 [INFO][3062] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.142-k8s-test--pod--1-eth0" May 17 00:42:11.213590 env[1209]: time="2025-05-17T00:42:11.213462297Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:42:11.213590 env[1209]: time="2025-05-17T00:42:11.213540245Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:42:11.213890 env[1209]: time="2025-05-17T00:42:11.213557988Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:42:11.213969 env[1209]: time="2025-05-17T00:42:11.213853051Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86 pid=3098 runtime=io.containerd.runc.v2 May 17 00:42:11.213000 audit[3099]: NETFILTER_CFG table=filter:86 family=2 entries=40 op=nft_register_chain pid=3099 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:42:11.213000 audit[3099]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffd35bd1d20 a2=0 a3=7ffd35bd1d0c items=0 ppid=2159 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:11.213000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:42:11.235825 systemd[1]: run-containerd-runc-k8s.io-4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86-runc.a7wEH3.mount: Deactivated successfully. May 17 00:42:11.238334 systemd[1]: Started cri-containerd-4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86.scope. May 17 00:42:11.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.257000 audit: BPF prog-id=120 op=LOAD May 17 00:42:11.258000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3098 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:11.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461336135316538663234623966343163656665323532643436313765 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3098 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:11.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461336135316538663234623966343163656665323532643436313765 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit: BPF prog-id=121 op=LOAD May 17 00:42:11.258000 audit[3109]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003061a0 items=0 ppid=3098 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:11.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461336135316538663234623966343163656665323532643436313765 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit: BPF prog-id=122 op=LOAD May 17 00:42:11.258000 audit[3109]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003061e8 items=0 ppid=3098 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:11.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461336135316538663234623966343163656665323532643436313765 May 17 00:42:11.258000 audit: BPF prog-id=122 op=UNLOAD May 17 00:42:11.258000 audit: BPF prog-id=121 op=UNLOAD May 17 00:42:11.258000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.258000 audit: BPF prog-id=123 op=LOAD May 17 00:42:11.258000 audit[3109]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003065f8 items=0 ppid=3098 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:11.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461336135316538663234623966343163656665323532643436313765 May 17 00:42:11.265885 systemd-resolved[1147]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:42:11.300868 env[1209]: time="2025-05-17T00:42:11.300800863Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:448b770d-2919-456f-8449-86e690db21ba,Namespace:default,Attempt:0,} returns sandbox id \"4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86\"" May 17 00:42:11.302556 env[1209]: time="2025-05-17T00:42:11.302495876Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 17 00:42:11.651162 kubelet[1454]: E0517 00:42:11.651094 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:11.667480 env[1209]: time="2025-05-17T00:42:11.667378691Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:11.670515 env[1209]: time="2025-05-17T00:42:11.670452794Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:11.673220 env[1209]: time="2025-05-17T00:42:11.673149498Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:11.675809 env[1209]: time="2025-05-17T00:42:11.675720716Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:42:11.676664 env[1209]: time="2025-05-17T00:42:11.676619213Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 17 00:42:11.680047 env[1209]: time="2025-05-17T00:42:11.679977130Z" level=info msg="CreateContainer within sandbox \"4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 17 00:42:11.705936 env[1209]: time="2025-05-17T00:42:11.705836802Z" level=info msg="CreateContainer within sandbox \"4a3a51e8f24b9f41cefe252d4617e664eadbfecc8bf29dc5ae36b4e941b87b86\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"d41319a22143c14fbc95a374e6a53e2b12be00974ddb3d5aab4ca938a0f42e37\"" May 17 00:42:11.706612 env[1209]: time="2025-05-17T00:42:11.706524624Z" level=info msg="StartContainer for \"d41319a22143c14fbc95a374e6a53e2b12be00974ddb3d5aab4ca938a0f42e37\"" May 17 00:42:11.741288 systemd[1]: Started cri-containerd-d41319a22143c14fbc95a374e6a53e2b12be00974ddb3d5aab4ca938a0f42e37.scope. May 17 00:42:11.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.767000 audit: BPF prog-id=124 op=LOAD May 17 00:42:11.771000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.771000 audit[3142]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3098 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:11.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434313331396132323134336331346662633935613337346536613533 May 17 00:42:11.771000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.771000 audit[3142]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3098 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:11.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434313331396132323134336331346662633935613337346536613533 May 17 00:42:11.771000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.771000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.771000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.771000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.771000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.771000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.771000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.771000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.771000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.771000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.771000 audit: BPF prog-id=125 op=LOAD May 17 00:42:11.771000 audit[3142]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002d5d10 items=0 ppid=3098 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:11.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434313331396132323134336331346662633935613337346536613533 May 17 00:42:11.774000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.774000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.774000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.774000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.774000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.774000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.774000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.774000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.774000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.774000 audit: BPF prog-id=126 op=LOAD May 17 00:42:11.774000 audit[3142]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002d5d58 items=0 ppid=3098 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:11.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434313331396132323134336331346662633935613337346536613533 May 17 00:42:11.774000 audit: BPF prog-id=126 op=UNLOAD May 17 00:42:11.774000 audit: BPF prog-id=125 op=UNLOAD May 17 00:42:11.774000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.774000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.774000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.774000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.774000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.774000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.774000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.774000 audit[3142]: AVC avc: denied { perfmon } for pid=3142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.774000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.774000 audit[3142]: AVC avc: denied { bpf } for pid=3142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:42:11.774000 audit: BPF prog-id=127 op=LOAD May 17 00:42:11.774000 audit[3142]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c0168 items=0 ppid=3098 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:42:11.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434313331396132323134336331346662633935613337346536613533 May 17 00:42:11.826294 env[1209]: time="2025-05-17T00:42:11.826202620Z" level=info msg="StartContainer for \"d41319a22143c14fbc95a374e6a53e2b12be00974ddb3d5aab4ca938a0f42e37\" returns successfully" May 17 00:42:12.651716 kubelet[1454]: E0517 00:42:12.651628 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:12.652035 systemd-networkd[1024]: cali5ec59c6bf6e: Gained IPv6LL May 17 00:42:13.652681 kubelet[1454]: E0517 00:42:13.652589 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:14.653655 kubelet[1454]: E0517 00:42:14.653531 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:15.655444 kubelet[1454]: E0517 00:42:15.653958 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:16.655608 kubelet[1454]: E0517 00:42:16.655504 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:17.656172 kubelet[1454]: E0517 00:42:17.656030 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:18.657283 kubelet[1454]: E0517 00:42:18.657189 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:19.520843 kubelet[1454]: E0517 00:42:19.520682 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:42:19.657505 kubelet[1454]: E0517 00:42:19.657411 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"