May 15 18:02:14.960297 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu May 15 09:06:41 -00 2025 May 15 18:02:14.960340 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 18:02:14.960360 kernel: BIOS-provided physical RAM map: May 15 18:02:14.960380 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 15 18:02:14.960395 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 15 18:02:14.960410 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 15 18:02:14.960427 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdcfff] usable May 15 18:02:14.960442 kernel: BIOS-e820: [mem 0x00000000bffdd000-0x00000000bfffffff] reserved May 15 18:02:14.960457 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 15 18:02:14.960472 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 15 18:02:14.960486 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable May 15 18:02:14.960501 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved May 15 18:02:14.960519 kernel: NX (Execute Disable) protection: active May 15 18:02:14.960534 kernel: SMBIOS 3.0.0 present. May 15 18:02:14.962850 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.16.3-debian-1.16.3-2 04/01/2014 May 15 18:02:14.962873 kernel: Hypervisor detected: KVM May 15 18:02:14.962890 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 15 18:02:14.962907 kernel: kvm-clock: cpu 0, msr bb19a001, primary cpu clock May 15 18:02:14.962931 kernel: kvm-clock: using sched offset of 4216995559 cycles May 15 18:02:14.962950 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 15 18:02:14.962967 kernel: tsc: Detected 1996.249 MHz processor May 15 18:02:14.962986 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 15 18:02:14.963004 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 15 18:02:14.963023 kernel: last_pfn = 0x140000 max_arch_pfn = 0x400000000 May 15 18:02:14.963041 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 15 18:02:14.963059 kernel: last_pfn = 0xbffdd max_arch_pfn = 0x400000000 May 15 18:02:14.963077 kernel: ACPI: Early table checksum verification disabled May 15 18:02:14.963099 kernel: ACPI: RSDP 0x00000000000F51E0 000014 (v00 BOCHS ) May 15 18:02:14.963118 kernel: ACPI: RSDT 0x00000000BFFE1B65 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 18:02:14.963136 kernel: ACPI: FACP 0x00000000BFFE1A49 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 18:02:14.963188 kernel: ACPI: DSDT 0x00000000BFFE0040 001A09 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 18:02:14.963209 kernel: ACPI: FACS 0x00000000BFFE0000 000040 May 15 18:02:14.963227 kernel: ACPI: APIC 0x00000000BFFE1ABD 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 15 18:02:14.963244 kernel: ACPI: WAET 0x00000000BFFE1B3D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 18:02:14.963262 kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1a49-0xbffe1abc] May 15 18:02:14.963283 kernel: ACPI: Reserving DSDT table memory at [mem 0xbffe0040-0xbffe1a48] May 15 18:02:14.963301 kernel: ACPI: Reserving FACS table memory at [mem 0xbffe0000-0xbffe003f] May 15 18:02:14.963318 kernel: ACPI: Reserving APIC table memory at [mem 0xbffe1abd-0xbffe1b3c] May 15 18:02:14.963335 kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1b3d-0xbffe1b64] May 15 18:02:14.963353 kernel: No NUMA configuration found May 15 18:02:14.963377 kernel: Faking a node at [mem 0x0000000000000000-0x000000013fffffff] May 15 18:02:14.963395 kernel: NODE_DATA(0) allocated [mem 0x13fff7000-0x13fffcfff] May 15 18:02:14.963416 kernel: Zone ranges: May 15 18:02:14.963435 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 15 18:02:14.963453 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 15 18:02:14.963471 kernel: Normal [mem 0x0000000100000000-0x000000013fffffff] May 15 18:02:14.963489 kernel: Movable zone start for each node May 15 18:02:14.963507 kernel: Early memory node ranges May 15 18:02:14.963525 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 15 18:02:14.963574 kernel: node 0: [mem 0x0000000000100000-0x00000000bffdcfff] May 15 18:02:14.963598 kernel: node 0: [mem 0x0000000100000000-0x000000013fffffff] May 15 18:02:14.963617 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000013fffffff] May 15 18:02:14.963635 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 18:02:14.963653 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 15 18:02:14.963672 kernel: On node 0, zone Normal: 35 pages in unavailable ranges May 15 18:02:14.963690 kernel: ACPI: PM-Timer IO Port: 0x608 May 15 18:02:14.963708 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 15 18:02:14.963726 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 15 18:02:14.963744 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 15 18:02:14.963766 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 15 18:02:14.963784 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 15 18:02:14.963802 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 15 18:02:14.963820 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 15 18:02:14.963839 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 15 18:02:14.963857 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 15 18:02:14.963875 kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices May 15 18:02:14.963893 kernel: Booting paravirtualized kernel on KVM May 15 18:02:14.963912 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 15 18:02:14.963933 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 15 18:02:14.963951 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 15 18:02:14.963969 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 15 18:02:14.963987 kernel: pcpu-alloc: [0] 0 1 May 15 18:02:14.964004 kernel: kvm-guest: stealtime: cpu 0, msr 13bc1c0c0 May 15 18:02:14.964023 kernel: kvm-guest: PV spinlocks disabled, no host support May 15 18:02:14.964041 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1031901 May 15 18:02:14.964059 kernel: Policy zone: Normal May 15 18:02:14.964080 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 18:02:14.964103 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 15 18:02:14.964121 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 15 18:02:14.964140 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 15 18:02:14.964158 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 15 18:02:14.964177 kernel: Memory: 3968276K/4193772K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 225236K reserved, 0K cma-reserved) May 15 18:02:14.964195 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 15 18:02:14.964214 kernel: ftrace: allocating 34585 entries in 136 pages May 15 18:02:14.964232 kernel: ftrace: allocated 136 pages with 2 groups May 15 18:02:14.964252 kernel: rcu: Hierarchical RCU implementation. May 15 18:02:14.964272 kernel: rcu: RCU event tracing is enabled. May 15 18:02:14.964291 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 15 18:02:14.964309 kernel: Rude variant of Tasks RCU enabled. May 15 18:02:14.964328 kernel: Tracing variant of Tasks RCU enabled. May 15 18:02:14.964346 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 15 18:02:14.964364 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 15 18:02:14.964382 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 15 18:02:14.964400 kernel: Console: colour VGA+ 80x25 May 15 18:02:14.964422 kernel: printk: console [tty0] enabled May 15 18:02:14.964440 kernel: printk: console [ttyS0] enabled May 15 18:02:14.964457 kernel: ACPI: Core revision 20210730 May 15 18:02:14.964475 kernel: APIC: Switch to symmetric I/O mode setup May 15 18:02:14.964493 kernel: x2apic enabled May 15 18:02:14.964511 kernel: Switched APIC routing to physical x2apic. May 15 18:02:14.964530 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 15 18:02:14.964571 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 15 18:02:14.964590 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) May 15 18:02:14.964612 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 May 15 18:02:14.964631 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 May 15 18:02:14.964649 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 15 18:02:14.964667 kernel: Spectre V2 : Mitigation: Retpolines May 15 18:02:14.964686 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 15 18:02:14.964704 kernel: Speculative Store Bypass: Vulnerable May 15 18:02:14.964722 kernel: x86/fpu: x87 FPU will use FXSAVE May 15 18:02:14.964740 kernel: Freeing SMP alternatives memory: 32K May 15 18:02:14.964758 kernel: pid_max: default: 32768 minimum: 301 May 15 18:02:14.964779 kernel: LSM: Security Framework initializing May 15 18:02:14.964797 kernel: SELinux: Initializing. May 15 18:02:14.964815 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 18:02:14.964834 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 18:02:14.964853 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) May 15 18:02:14.964871 kernel: Performance Events: AMD PMU driver. May 15 18:02:14.964901 kernel: ... version: 0 May 15 18:02:14.964922 kernel: ... bit width: 48 May 15 18:02:14.964940 kernel: ... generic registers: 4 May 15 18:02:14.964959 kernel: ... value mask: 0000ffffffffffff May 15 18:02:14.964979 kernel: ... max period: 00007fffffffffff May 15 18:02:14.964998 kernel: ... fixed-purpose events: 0 May 15 18:02:14.965019 kernel: ... event mask: 000000000000000f May 15 18:02:14.965038 kernel: signal: max sigframe size: 1440 May 15 18:02:14.965063 kernel: rcu: Hierarchical SRCU implementation. May 15 18:02:14.965082 kernel: smp: Bringing up secondary CPUs ... May 15 18:02:14.965101 kernel: x86: Booting SMP configuration: May 15 18:02:14.965123 kernel: .... node #0, CPUs: #1 May 15 18:02:14.965142 kernel: kvm-clock: cpu 1, msr bb19a041, secondary cpu clock May 15 18:02:14.965161 kernel: kvm-guest: stealtime: cpu 1, msr 13bd1c0c0 May 15 18:02:14.965180 kernel: smp: Brought up 1 node, 2 CPUs May 15 18:02:14.965199 kernel: smpboot: Max logical packages: 2 May 15 18:02:14.965218 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) May 15 18:02:14.965237 kernel: devtmpfs: initialized May 15 18:02:14.965256 kernel: x86/mm: Memory block size: 128MB May 15 18:02:14.965276 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 15 18:02:14.965298 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 15 18:02:14.965318 kernel: pinctrl core: initialized pinctrl subsystem May 15 18:02:14.965337 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 15 18:02:14.965356 kernel: audit: initializing netlink subsys (disabled) May 15 18:02:14.965375 kernel: audit: type=2000 audit(1747332133.707:1): state=initialized audit_enabled=0 res=1 May 15 18:02:14.965394 kernel: thermal_sys: Registered thermal governor 'step_wise' May 15 18:02:14.965413 kernel: thermal_sys: Registered thermal governor 'user_space' May 15 18:02:14.965432 kernel: cpuidle: using governor menu May 15 18:02:14.965450 kernel: ACPI: bus type PCI registered May 15 18:02:14.965473 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 15 18:02:14.965493 kernel: dca service started, version 1.12.1 May 15 18:02:14.965512 kernel: PCI: Using configuration type 1 for base access May 15 18:02:14.965531 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 15 18:02:14.965571 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 15 18:02:14.965591 kernel: ACPI: Added _OSI(Module Device) May 15 18:02:14.965610 kernel: ACPI: Added _OSI(Processor Device) May 15 18:02:14.965629 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 15 18:02:14.965648 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 15 18:02:14.965671 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 15 18:02:14.965711 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 15 18:02:14.965731 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 15 18:02:14.965751 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 15 18:02:14.965770 kernel: ACPI: Interpreter enabled May 15 18:02:14.965789 kernel: ACPI: PM: (supports S0 S3 S5) May 15 18:02:14.965809 kernel: ACPI: Using IOAPIC for interrupt routing May 15 18:02:14.965829 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 15 18:02:14.965848 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 15 18:02:14.965871 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 15 18:02:14.966172 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 15 18:02:14.966376 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 15 18:02:14.966407 kernel: acpiphp: Slot [3] registered May 15 18:02:14.966427 kernel: acpiphp: Slot [4] registered May 15 18:02:14.966446 kernel: acpiphp: Slot [5] registered May 15 18:02:14.966465 kernel: acpiphp: Slot [6] registered May 15 18:02:14.966484 kernel: acpiphp: Slot [7] registered May 15 18:02:14.966508 kernel: acpiphp: Slot [8] registered May 15 18:02:14.966527 kernel: acpiphp: Slot [9] registered May 15 18:02:14.970592 kernel: acpiphp: Slot [10] registered May 15 18:02:14.970620 kernel: acpiphp: Slot [11] registered May 15 18:02:14.970637 kernel: acpiphp: Slot [12] registered May 15 18:02:14.970654 kernel: acpiphp: Slot [13] registered May 15 18:02:14.970670 kernel: acpiphp: Slot [14] registered May 15 18:02:14.970685 kernel: acpiphp: Slot [15] registered May 15 18:02:14.970701 kernel: acpiphp: Slot [16] registered May 15 18:02:14.970722 kernel: acpiphp: Slot [17] registered May 15 18:02:14.970738 kernel: acpiphp: Slot [18] registered May 15 18:02:14.970753 kernel: acpiphp: Slot [19] registered May 15 18:02:14.970769 kernel: acpiphp: Slot [20] registered May 15 18:02:14.970785 kernel: acpiphp: Slot [21] registered May 15 18:02:14.970800 kernel: acpiphp: Slot [22] registered May 15 18:02:14.970816 kernel: acpiphp: Slot [23] registered May 15 18:02:14.970832 kernel: acpiphp: Slot [24] registered May 15 18:02:14.970848 kernel: acpiphp: Slot [25] registered May 15 18:02:14.970863 kernel: acpiphp: Slot [26] registered May 15 18:02:14.970881 kernel: acpiphp: Slot [27] registered May 15 18:02:14.970898 kernel: acpiphp: Slot [28] registered May 15 18:02:14.970913 kernel: acpiphp: Slot [29] registered May 15 18:02:14.970928 kernel: acpiphp: Slot [30] registered May 15 18:02:14.970944 kernel: acpiphp: Slot [31] registered May 15 18:02:14.970959 kernel: PCI host bridge to bus 0000:00 May 15 18:02:14.971160 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 15 18:02:14.971253 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 15 18:02:14.971331 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 15 18:02:14.971406 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 15 18:02:14.971479 kernel: pci_bus 0000:00: root bus resource [mem 0xc000000000-0xc07fffffff window] May 15 18:02:14.971570 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 15 18:02:14.971671 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 15 18:02:14.971767 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 15 18:02:14.971867 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 May 15 18:02:14.971952 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] May 15 18:02:14.972035 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 15 18:02:14.972120 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 15 18:02:14.972203 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 15 18:02:14.972284 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 15 18:02:14.972375 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 May 15 18:02:14.972463 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI May 15 18:02:14.972566 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB May 15 18:02:14.972665 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 May 15 18:02:14.972749 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] May 15 18:02:14.972840 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xc000000000-0xc000003fff 64bit pref] May 15 18:02:14.972929 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] May 15 18:02:14.973016 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] May 15 18:02:14.973101 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 15 18:02:14.973196 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 May 15 18:02:14.973279 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] May 15 18:02:14.973360 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] May 15 18:02:14.973441 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xc000004000-0xc000007fff 64bit pref] May 15 18:02:14.973522 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] May 15 18:02:14.973632 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 May 15 18:02:14.973735 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] May 15 18:02:14.973818 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] May 15 18:02:14.973901 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xc000008000-0xc00000bfff 64bit pref] May 15 18:02:14.973989 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 May 15 18:02:14.974072 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] May 15 18:02:14.974153 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xc00000c000-0xc00000ffff 64bit pref] May 15 18:02:14.974249 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 May 15 18:02:14.974334 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] May 15 18:02:14.974416 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfeb93000-0xfeb93fff] May 15 18:02:14.974497 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xc000010000-0xc000013fff 64bit pref] May 15 18:02:14.974509 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 15 18:02:14.974518 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 15 18:02:14.974526 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 15 18:02:14.974534 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 15 18:02:14.974560 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 15 18:02:14.974569 kernel: iommu: Default domain type: Translated May 15 18:02:14.974577 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 15 18:02:14.974664 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device May 15 18:02:14.974749 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 15 18:02:14.974835 kernel: pci 0000:00:02.0: vgaarb: bridge control possible May 15 18:02:14.974847 kernel: vgaarb: loaded May 15 18:02:14.974856 kernel: pps_core: LinuxPPS API ver. 1 registered May 15 18:02:14.974865 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 15 18:02:14.974878 kernel: PTP clock support registered May 15 18:02:14.974886 kernel: PCI: Using ACPI for IRQ routing May 15 18:02:14.974894 kernel: PCI: pci_cache_line_size set to 64 bytes May 15 18:02:14.974903 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 15 18:02:14.974911 kernel: e820: reserve RAM buffer [mem 0xbffdd000-0xbfffffff] May 15 18:02:14.974919 kernel: clocksource: Switched to clocksource kvm-clock May 15 18:02:14.974927 kernel: VFS: Disk quotas dquot_6.6.0 May 15 18:02:14.974935 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 15 18:02:14.974943 kernel: pnp: PnP ACPI init May 15 18:02:14.975038 kernel: pnp 00:03: [dma 2] May 15 18:02:14.975053 kernel: pnp: PnP ACPI: found 5 devices May 15 18:02:14.975062 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 15 18:02:14.975070 kernel: NET: Registered PF_INET protocol family May 15 18:02:14.975080 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 15 18:02:14.975089 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 15 18:02:14.975097 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 15 18:02:14.975106 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 15 18:02:14.975118 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 15 18:02:14.975126 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 15 18:02:14.975135 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 18:02:14.975144 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 18:02:14.975153 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 15 18:02:14.975162 kernel: NET: Registered PF_XDP protocol family May 15 18:02:14.975243 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 15 18:02:14.975325 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 15 18:02:14.975402 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 15 18:02:14.975484 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] May 15 18:02:14.975582 kernel: pci_bus 0000:00: resource 8 [mem 0xc000000000-0xc07fffffff window] May 15 18:02:14.975675 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release May 15 18:02:14.975766 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 15 18:02:14.975857 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 15 18:02:14.975871 kernel: PCI: CLS 0 bytes, default 64 May 15 18:02:14.975880 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 15 18:02:14.975890 kernel: software IO TLB: mapped [mem 0x00000000bbfdd000-0x00000000bffdd000] (64MB) May 15 18:02:14.975902 kernel: Initialise system trusted keyrings May 15 18:02:14.975912 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 15 18:02:14.975922 kernel: Key type asymmetric registered May 15 18:02:14.975930 kernel: Asymmetric key parser 'x509' registered May 15 18:02:14.975940 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 15 18:02:14.975949 kernel: io scheduler mq-deadline registered May 15 18:02:14.975958 kernel: io scheduler kyber registered May 15 18:02:14.975967 kernel: io scheduler bfq registered May 15 18:02:14.975976 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 15 18:02:14.975988 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 May 15 18:02:14.975997 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 May 15 18:02:14.976006 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 15 18:02:14.976015 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 May 15 18:02:14.976024 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 15 18:02:14.976033 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 15 18:02:14.976041 kernel: random: crng init done May 15 18:02:14.976050 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 15 18:02:14.976058 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 15 18:02:14.976069 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 15 18:02:14.976078 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 15 18:02:14.976165 kernel: rtc_cmos 00:04: RTC can wake from S4 May 15 18:02:14.976246 kernel: rtc_cmos 00:04: registered as rtc0 May 15 18:02:14.976327 kernel: rtc_cmos 00:04: setting system clock to 2025-05-15T18:02:14 UTC (1747332134) May 15 18:02:14.976406 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram May 15 18:02:14.976418 kernel: NET: Registered PF_INET6 protocol family May 15 18:02:14.976427 kernel: Segment Routing with IPv6 May 15 18:02:14.976439 kernel: In-situ OAM (IOAM) with IPv6 May 15 18:02:14.976448 kernel: NET: Registered PF_PACKET protocol family May 15 18:02:14.976457 kernel: Key type dns_resolver registered May 15 18:02:14.976465 kernel: IPI shorthand broadcast: enabled May 15 18:02:14.976474 kernel: sched_clock: Marking stable (841306349, 169096067)->(1077985902, -67583486) May 15 18:02:14.976483 kernel: registered taskstats version 1 May 15 18:02:14.976491 kernel: Loading compiled-in X.509 certificates May 15 18:02:14.976500 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 04007c306af6b7696d09b3c2eafc1297036fd28e' May 15 18:02:14.976509 kernel: Key type .fscrypt registered May 15 18:02:14.976519 kernel: Key type fscrypt-provisioning registered May 15 18:02:14.976528 kernel: ima: No TPM chip found, activating TPM-bypass! May 15 18:02:14.976537 kernel: ima: Allocated hash algorithm: sha1 May 15 18:02:14.982636 kernel: ima: No architecture policies found May 15 18:02:14.982651 kernel: clk: Disabling unused clocks May 15 18:02:14.982660 kernel: Freeing unused kernel image (initmem) memory: 47472K May 15 18:02:14.982669 kernel: Write protecting the kernel read-only data: 28672k May 15 18:02:14.982677 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 15 18:02:14.982690 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 15 18:02:14.982698 kernel: Run /init as init process May 15 18:02:14.982707 kernel: with arguments: May 15 18:02:14.982715 kernel: /init May 15 18:02:14.982723 kernel: with environment: May 15 18:02:14.982731 kernel: HOME=/ May 15 18:02:14.982738 kernel: TERM=linux May 15 18:02:14.982747 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 15 18:02:14.982759 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 18:02:14.982772 systemd[1]: Detected virtualization kvm. May 15 18:02:14.982781 systemd[1]: Detected architecture x86-64. May 15 18:02:14.982789 systemd[1]: Running in initrd. May 15 18:02:14.982798 systemd[1]: No hostname configured, using default hostname. May 15 18:02:14.982806 systemd[1]: Hostname set to . May 15 18:02:14.982815 systemd[1]: Initializing machine ID from VM UUID. May 15 18:02:14.982824 systemd[1]: Queued start job for default target initrd.target. May 15 18:02:14.982834 systemd[1]: Started systemd-ask-password-console.path. May 15 18:02:14.982843 systemd[1]: Reached target cryptsetup.target. May 15 18:02:14.982851 systemd[1]: Reached target paths.target. May 15 18:02:14.982860 systemd[1]: Reached target slices.target. May 15 18:02:14.982868 systemd[1]: Reached target swap.target. May 15 18:02:14.982877 systemd[1]: Reached target timers.target. May 15 18:02:14.982886 systemd[1]: Listening on iscsid.socket. May 15 18:02:14.982894 systemd[1]: Listening on iscsiuio.socket. May 15 18:02:14.982905 systemd[1]: Listening on systemd-journald-audit.socket. May 15 18:02:14.982921 systemd[1]: Listening on systemd-journald-dev-log.socket. May 15 18:02:14.982931 systemd[1]: Listening on systemd-journald.socket. May 15 18:02:14.982940 systemd[1]: Listening on systemd-networkd.socket. May 15 18:02:14.982949 systemd[1]: Listening on systemd-udevd-control.socket. May 15 18:02:14.982958 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 18:02:14.982968 systemd[1]: Reached target sockets.target. May 15 18:02:14.982977 systemd[1]: Starting kmod-static-nodes.service... May 15 18:02:14.982986 systemd[1]: Finished network-cleanup.service. May 15 18:02:14.982995 systemd[1]: Starting systemd-fsck-usr.service... May 15 18:02:14.983004 systemd[1]: Starting systemd-journald.service... May 15 18:02:14.983013 systemd[1]: Starting systemd-modules-load.service... May 15 18:02:14.983022 systemd[1]: Starting systemd-resolved.service... May 15 18:02:14.983030 systemd[1]: Starting systemd-vconsole-setup.service... May 15 18:02:14.983039 systemd[1]: Finished kmod-static-nodes.service. May 15 18:02:14.983049 systemd[1]: Finished systemd-fsck-usr.service. May 15 18:02:14.983063 systemd-journald[185]: Journal started May 15 18:02:14.983123 systemd-journald[185]: Runtime Journal (/run/log/journal/253c1d2fe8444f6aa6ea3391e82220be) is 8.0M, max 78.4M, 70.4M free. May 15 18:02:14.969015 systemd-modules-load[186]: Inserted module 'overlay' May 15 18:02:15.000985 systemd[1]: Started systemd-resolved.service. May 15 18:02:15.001018 kernel: audit: type=1130 audit(1747332134.993:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:14.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:14.975183 systemd-resolved[187]: Positive Trust Anchors: May 15 18:02:14.975196 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 18:02:14.975235 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 18:02:15.013511 systemd[1]: Started systemd-journald.service. May 15 18:02:15.013533 kernel: audit: type=1130 audit(1747332135.004:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:15.018046 kernel: audit: type=1130 audit(1747332135.006:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:15.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:15.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:14.978141 systemd-resolved[187]: Defaulting to hostname 'linux'. May 15 18:02:15.011775 systemd[1]: Reached target nss-lookup.target. May 15 18:02:15.012971 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 18:02:15.021502 systemd[1]: Finished systemd-vconsole-setup.service. May 15 18:02:15.023319 systemd[1]: Starting dracut-cmdline-ask.service... May 15 18:02:15.024585 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 18:02:15.039036 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 15 18:02:15.039058 kernel: audit: type=1130 audit(1747332135.021:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:15.039071 kernel: audit: type=1130 audit(1747332135.024:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:15.039082 kernel: Bridge firewalling registered May 15 18:02:15.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:15.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:15.041499 systemd-modules-load[186]: Inserted module 'br_netfilter' May 15 18:02:15.058966 kernel: audit: type=1130 audit(1747332135.052:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:15.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:15.052270 systemd[1]: Finished dracut-cmdline-ask.service. May 15 18:02:15.053604 systemd[1]: Starting dracut-cmdline.service... May 15 18:02:15.066945 dracut-cmdline[202]: dracut-dracut-053 May 15 18:02:15.071393 dracut-cmdline[202]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 18:02:15.077583 kernel: SCSI subsystem initialized May 15 18:02:15.099914 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 15 18:02:15.099964 kernel: device-mapper: uevent: version 1.0.3 May 15 18:02:15.102017 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 15 18:02:15.105357 systemd-modules-load[186]: Inserted module 'dm_multipath' May 15 18:02:15.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:15.106845 systemd[1]: Finished systemd-modules-load.service. May 15 18:02:15.113796 kernel: audit: type=1130 audit(1747332135.106:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:15.108108 systemd[1]: Starting systemd-sysctl.service... May 15 18:02:15.120062 systemd[1]: Finished systemd-sysctl.service. May 15 18:02:15.125641 kernel: audit: type=1130 audit(1747332135.120:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:15.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:15.135575 kernel: Loading iSCSI transport class v2.0-870. May 15 18:02:15.158584 kernel: iscsi: registered transport (tcp) May 15 18:02:15.185584 kernel: iscsi: registered transport (qla4xxx) May 15 18:02:15.185648 kernel: QLogic iSCSI HBA Driver May 15 18:02:15.232755 systemd[1]: Finished dracut-cmdline.service. May 15 18:02:15.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:15.237713 systemd[1]: Starting dracut-pre-udev.service... May 15 18:02:15.244346 kernel: audit: type=1130 audit(1747332135.233:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:15.293650 kernel: raid6: sse2x4 gen() 13179 MB/s May 15 18:02:15.311673 kernel: raid6: sse2x4 xor() 6839 MB/s May 15 18:02:15.329647 kernel: raid6: sse2x2 gen() 14204 MB/s May 15 18:02:15.347649 kernel: raid6: sse2x2 xor() 8735 MB/s May 15 18:02:15.365646 kernel: raid6: sse2x1 gen() 11185 MB/s May 15 18:02:15.384600 kernel: raid6: sse2x1 xor() 6416 MB/s May 15 18:02:15.384637 kernel: raid6: using algorithm sse2x2 gen() 14204 MB/s May 15 18:02:15.384652 kernel: raid6: .... xor() 8735 MB/s, rmw enabled May 15 18:02:15.386006 kernel: raid6: using ssse3x2 recovery algorithm May 15 18:02:15.406091 kernel: xor: measuring software checksum speed May 15 18:02:15.406118 kernel: prefetch64-sse : 18315 MB/sec May 15 18:02:15.407404 kernel: generic_sse : 15620 MB/sec May 15 18:02:15.407420 kernel: xor: using function: prefetch64-sse (18315 MB/sec) May 15 18:02:15.526601 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 15 18:02:15.542233 systemd[1]: Finished dracut-pre-udev.service. May 15 18:02:15.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:15.542000 audit: BPF prog-id=7 op=LOAD May 15 18:02:15.542000 audit: BPF prog-id=8 op=LOAD May 15 18:02:15.543754 systemd[1]: Starting systemd-udevd.service... May 15 18:02:15.557711 systemd-udevd[385]: Using default interface naming scheme 'v252'. May 15 18:02:15.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:15.562443 systemd[1]: Started systemd-udevd.service. May 15 18:02:15.571810 systemd[1]: Starting dracut-pre-trigger.service... May 15 18:02:15.588821 dracut-pre-trigger[407]: rd.md=0: removing MD RAID activation May 15 18:02:15.644772 systemd[1]: Finished dracut-pre-trigger.service. May 15 18:02:15.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:15.647810 systemd[1]: Starting systemd-udev-trigger.service... May 15 18:02:15.711208 systemd[1]: Finished systemd-udev-trigger.service. May 15 18:02:15.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:15.778917 kernel: virtio_blk virtio2: [vda] 20971520 512-byte logical blocks (10.7 GB/10.0 GiB) May 15 18:02:15.820162 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 15 18:02:15.820183 kernel: GPT:17805311 != 20971519 May 15 18:02:15.820194 kernel: GPT:Alternate GPT header not at the end of the disk. May 15 18:02:15.820205 kernel: GPT:17805311 != 20971519 May 15 18:02:15.820215 kernel: GPT: Use GNU Parted to correct GPT errors. May 15 18:02:15.820225 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 18:02:15.820241 kernel: libata version 3.00 loaded. May 15 18:02:15.820252 kernel: ata_piix 0000:00:01.1: version 2.13 May 15 18:02:15.820749 kernel: scsi host0: ata_piix May 15 18:02:15.820862 kernel: scsi host1: ata_piix May 15 18:02:15.820969 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 May 15 18:02:15.820981 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 May 15 18:02:15.844568 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (441) May 15 18:02:15.850732 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 15 18:02:15.897367 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 15 18:02:15.901793 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 18:02:15.908282 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 15 18:02:15.908896 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 15 18:02:15.910935 systemd[1]: Starting disk-uuid.service... May 15 18:02:15.923526 disk-uuid[471]: Primary Header is updated. May 15 18:02:15.923526 disk-uuid[471]: Secondary Entries is updated. May 15 18:02:15.923526 disk-uuid[471]: Secondary Header is updated. May 15 18:02:15.932563 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 18:02:15.937567 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 18:02:16.950603 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 18:02:16.951701 disk-uuid[472]: The operation has completed successfully. May 15 18:02:17.028779 systemd[1]: disk-uuid.service: Deactivated successfully. May 15 18:02:17.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:17.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:17.028989 systemd[1]: Finished disk-uuid.service. May 15 18:02:17.039994 systemd[1]: Starting verity-setup.service... May 15 18:02:17.058655 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" May 15 18:02:17.148736 systemd[1]: Found device dev-mapper-usr.device. May 15 18:02:17.150024 systemd[1]: Mounting sysusr-usr.mount... May 15 18:02:17.154466 systemd[1]: Finished verity-setup.service. May 15 18:02:17.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:17.253639 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 15 18:02:17.254227 systemd[1]: Mounted sysusr-usr.mount. May 15 18:02:17.256167 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 15 18:02:17.257941 systemd[1]: Starting ignition-setup.service... May 15 18:02:17.260778 systemd[1]: Starting parse-ip-for-networkd.service... May 15 18:02:17.276564 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 18:02:17.276619 kernel: BTRFS info (device vda6): using free space tree May 15 18:02:17.276631 kernel: BTRFS info (device vda6): has skinny extents May 15 18:02:17.296729 systemd[1]: mnt-oem.mount: Deactivated successfully. May 15 18:02:17.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:17.311015 systemd[1]: Finished ignition-setup.service. May 15 18:02:17.312388 systemd[1]: Starting ignition-fetch-offline.service... May 15 18:02:17.411949 systemd[1]: Finished parse-ip-for-networkd.service. May 15 18:02:17.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:17.414000 audit: BPF prog-id=9 op=LOAD May 15 18:02:17.415597 systemd[1]: Starting systemd-networkd.service... May 15 18:02:17.446123 systemd-networkd[643]: lo: Link UP May 15 18:02:17.446135 systemd-networkd[643]: lo: Gained carrier May 15 18:02:17.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:17.446619 systemd-networkd[643]: Enumeration completed May 15 18:02:17.446704 systemd[1]: Started systemd-networkd.service. May 15 18:02:17.446979 systemd-networkd[643]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 18:02:17.448704 systemd-networkd[643]: eth0: Link UP May 15 18:02:17.448708 systemd-networkd[643]: eth0: Gained carrier May 15 18:02:17.449439 systemd[1]: Reached target network.target. May 15 18:02:17.451987 systemd[1]: Starting iscsiuio.service... May 15 18:02:17.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:17.463696 systemd[1]: Started iscsiuio.service. May 15 18:02:17.465266 systemd[1]: Starting iscsid.service... May 15 18:02:17.468683 systemd-networkd[643]: eth0: DHCPv4 address 172.24.4.194/24, gateway 172.24.4.1 acquired from 172.24.4.1 May 15 18:02:17.472055 iscsid[652]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 15 18:02:17.472055 iscsid[652]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 15 18:02:17.472055 iscsid[652]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 15 18:02:17.472055 iscsid[652]: If using hardware iscsi like qla4xxx this message can be ignored. May 15 18:02:17.472055 iscsid[652]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 15 18:02:17.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:17.478693 iscsid[652]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 15 18:02:17.474884 systemd[1]: Started iscsid.service. May 15 18:02:17.476809 systemd[1]: Starting dracut-initqueue.service... May 15 18:02:17.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:17.490060 systemd[1]: Finished dracut-initqueue.service. May 15 18:02:17.490734 systemd[1]: Reached target remote-fs-pre.target. May 15 18:02:17.491208 systemd[1]: Reached target remote-cryptsetup.target. May 15 18:02:17.491716 systemd[1]: Reached target remote-fs.target. May 15 18:02:17.493111 systemd[1]: Starting dracut-pre-mount.service... May 15 18:02:17.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:17.503203 systemd[1]: Finished dracut-pre-mount.service. May 15 18:02:17.635233 ignition[563]: Ignition 2.14.0 May 15 18:02:17.635255 ignition[563]: Stage: fetch-offline May 15 18:02:17.635409 ignition[563]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 18:02:17.635457 ignition[563]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 18:02:17.640717 systemd[1]: Finished ignition-fetch-offline.service. May 15 18:02:17.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:17.637812 ignition[563]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 18:02:17.643708 systemd-resolved[187]: Detected conflict on linux IN A 172.24.4.194 May 15 18:02:17.638059 ignition[563]: parsed url from cmdline: "" May 15 18:02:17.643727 systemd-resolved[187]: Hostname conflict, changing published hostname from 'linux' to 'linux3'. May 15 18:02:17.638073 ignition[563]: no config URL provided May 15 18:02:17.644081 systemd[1]: Starting ignition-fetch.service... May 15 18:02:17.638087 ignition[563]: reading system config file "/usr/lib/ignition/user.ign" May 15 18:02:17.638108 ignition[563]: no config at "/usr/lib/ignition/user.ign" May 15 18:02:17.638128 ignition[563]: failed to fetch config: resource requires networking May 15 18:02:17.638713 ignition[563]: Ignition finished successfully May 15 18:02:17.663043 ignition[666]: Ignition 2.14.0 May 15 18:02:17.663071 ignition[666]: Stage: fetch May 15 18:02:17.663492 ignition[666]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 18:02:17.663626 ignition[666]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 18:02:17.666055 ignition[666]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 18:02:17.666269 ignition[666]: parsed url from cmdline: "" May 15 18:02:17.666279 ignition[666]: no config URL provided May 15 18:02:17.666291 ignition[666]: reading system config file "/usr/lib/ignition/user.ign" May 15 18:02:17.666311 ignition[666]: no config at "/usr/lib/ignition/user.ign" May 15 18:02:17.673598 ignition[666]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... May 15 18:02:17.673635 ignition[666]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... May 15 18:02:17.674517 ignition[666]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 May 15 18:02:17.963488 ignition[666]: GET result: OK May 15 18:02:17.963676 ignition[666]: parsing config with SHA512: 50d2e71f11fd00673ebf0b62454835e290fc0a5d3ae8dd162c1dba0f3dea93da29db385f5c88e8b6d2a372e07dbcf0431db868bdc8f1b98d2682c3c0bb69f059 May 15 18:02:18.015279 unknown[666]: fetched base config from "system" May 15 18:02:18.015313 unknown[666]: fetched base config from "system" May 15 18:02:18.016075 ignition[666]: fetch: fetch complete May 15 18:02:18.015328 unknown[666]: fetched user config from "openstack" May 15 18:02:18.016089 ignition[666]: fetch: fetch passed May 15 18:02:18.019169 systemd[1]: Finished ignition-fetch.service. May 15 18:02:18.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:18.016171 ignition[666]: Ignition finished successfully May 15 18:02:18.034766 systemd[1]: Starting ignition-kargs.service... May 15 18:02:18.055228 ignition[672]: Ignition 2.14.0 May 15 18:02:18.055254 ignition[672]: Stage: kargs May 15 18:02:18.055487 ignition[672]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 18:02:18.055532 ignition[672]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 18:02:18.057902 ignition[672]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 18:02:18.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:18.061781 systemd[1]: Finished ignition-kargs.service. May 15 18:02:18.059952 ignition[672]: kargs: kargs passed May 15 18:02:18.064825 systemd[1]: Starting ignition-disks.service... May 15 18:02:18.060045 ignition[672]: Ignition finished successfully May 15 18:02:18.084322 ignition[677]: Ignition 2.14.0 May 15 18:02:18.084388 ignition[677]: Stage: disks May 15 18:02:18.084764 ignition[677]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 18:02:18.084807 ignition[677]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 18:02:18.087189 ignition[677]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 18:02:18.089265 ignition[677]: disks: disks passed May 15 18:02:18.091537 systemd[1]: Finished ignition-disks.service. May 15 18:02:18.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:18.089362 ignition[677]: Ignition finished successfully May 15 18:02:18.094147 systemd[1]: Reached target initrd-root-device.target. May 15 18:02:18.096374 systemd[1]: Reached target local-fs-pre.target. May 15 18:02:18.098834 systemd[1]: Reached target local-fs.target. May 15 18:02:18.101247 systemd[1]: Reached target sysinit.target. May 15 18:02:18.103635 systemd[1]: Reached target basic.target. May 15 18:02:18.107746 systemd[1]: Starting systemd-fsck-root.service... May 15 18:02:18.141452 systemd-fsck[685]: ROOT: clean, 623/1628000 files, 124060/1617920 blocks May 15 18:02:18.163748 systemd[1]: Finished systemd-fsck-root.service. May 15 18:02:18.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:18.168368 systemd[1]: Mounting sysroot.mount... May 15 18:02:18.198618 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 15 18:02:18.199784 systemd[1]: Mounted sysroot.mount. May 15 18:02:18.202391 systemd[1]: Reached target initrd-root-fs.target. May 15 18:02:18.208193 systemd[1]: Mounting sysroot-usr.mount... May 15 18:02:18.211764 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 15 18:02:18.214677 systemd[1]: Starting flatcar-openstack-hostname.service... May 15 18:02:18.216057 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 15 18:02:18.216123 systemd[1]: Reached target ignition-diskful.target. May 15 18:02:18.219732 systemd[1]: Mounted sysroot-usr.mount. May 15 18:02:18.232318 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 18:02:18.236468 systemd[1]: Starting initrd-setup-root.service... May 15 18:02:18.249019 initrd-setup-root[697]: cut: /sysroot/etc/passwd: No such file or directory May 15 18:02:18.264983 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (692) May 15 18:02:18.265085 initrd-setup-root[705]: cut: /sysroot/etc/group: No such file or directory May 15 18:02:18.285599 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 18:02:18.285657 kernel: BTRFS info (device vda6): using free space tree May 15 18:02:18.285668 kernel: BTRFS info (device vda6): has skinny extents May 15 18:02:18.285692 initrd-setup-root[713]: cut: /sysroot/etc/shadow: No such file or directory May 15 18:02:18.295018 initrd-setup-root[737]: cut: /sysroot/etc/gshadow: No such file or directory May 15 18:02:18.307722 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 18:02:18.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:18.376592 systemd[1]: Finished initrd-setup-root.service. May 15 18:02:18.377978 systemd[1]: Starting ignition-mount.service... May 15 18:02:18.380221 systemd[1]: Starting sysroot-boot.service... May 15 18:02:18.389944 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 15 18:02:18.391018 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 15 18:02:18.406397 ignition[760]: INFO : Ignition 2.14.0 May 15 18:02:18.406397 ignition[760]: INFO : Stage: mount May 15 18:02:18.409210 ignition[760]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 18:02:18.409210 ignition[760]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 18:02:18.409210 ignition[760]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 18:02:18.409210 ignition[760]: INFO : mount: mount passed May 15 18:02:18.409210 ignition[760]: INFO : Ignition finished successfully May 15 18:02:18.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:18.409871 systemd[1]: Finished ignition-mount.service. May 15 18:02:18.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:18.433527 systemd[1]: Finished sysroot-boot.service. May 15 18:02:18.471016 coreos-metadata[691]: May 15 18:02:18.470 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 May 15 18:02:18.489438 coreos-metadata[691]: May 15 18:02:18.489 INFO Fetch successful May 15 18:02:18.489438 coreos-metadata[691]: May 15 18:02:18.489 INFO wrote hostname ci-3510-3-100-e9c60cb6b7.novalocal to /sysroot/etc/hostname May 15 18:02:18.492667 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. May 15 18:02:18.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:18.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:18.492753 systemd[1]: Finished flatcar-openstack-hostname.service. May 15 18:02:18.494621 systemd[1]: Starting ignition-files.service... May 15 18:02:18.506528 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 18:02:18.523672 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (768) May 15 18:02:18.533473 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 18:02:18.533499 kernel: BTRFS info (device vda6): using free space tree May 15 18:02:18.533510 kernel: BTRFS info (device vda6): has skinny extents May 15 18:02:18.548107 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 18:02:18.572013 ignition[787]: INFO : Ignition 2.14.0 May 15 18:02:18.572013 ignition[787]: INFO : Stage: files May 15 18:02:18.574902 ignition[787]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 18:02:18.574902 ignition[787]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 18:02:18.574902 ignition[787]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 18:02:18.582637 ignition[787]: DEBUG : files: compiled without relabeling support, skipping May 15 18:02:18.584479 ignition[787]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 15 18:02:18.586667 ignition[787]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 15 18:02:18.594530 ignition[787]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 15 18:02:18.596816 ignition[787]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 15 18:02:18.601258 unknown[787]: wrote ssh authorized keys file for user: core May 15 18:02:18.603205 ignition[787]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 15 18:02:18.605188 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 15 18:02:18.605188 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 15 18:02:18.605188 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 15 18:02:18.605188 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 15 18:02:18.605188 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 18:02:18.605188 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 18:02:18.605188 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 18:02:18.605188 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 May 15 18:02:18.906649 systemd-networkd[643]: eth0: Gained IPv6LL May 15 18:02:19.304358 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK May 15 18:02:20.947884 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 18:02:20.949384 ignition[787]: INFO : files: op(7): [started] processing unit "coreos-metadata-sshkeys@.service" May 15 18:02:20.954343 ignition[787]: INFO : files: op(7): [finished] processing unit "coreos-metadata-sshkeys@.service" May 15 18:02:20.954343 ignition[787]: INFO : files: op(8): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 15 18:02:20.954343 ignition[787]: INFO : files: op(8): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 15 18:02:20.963587 ignition[787]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" May 15 18:02:20.963587 ignition[787]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" May 15 18:02:20.963587 ignition[787]: INFO : files: files passed May 15 18:02:20.963587 ignition[787]: INFO : Ignition finished successfully May 15 18:02:20.979085 kernel: kauditd_printk_skb: 27 callbacks suppressed May 15 18:02:20.979111 kernel: audit: type=1130 audit(1747332140.969:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:20.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:20.965628 systemd[1]: Finished ignition-files.service. May 15 18:02:20.974358 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 15 18:02:20.982268 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 15 18:02:20.983901 systemd[1]: Starting ignition-quench.service... May 15 18:02:20.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:20.994772 initrd-setup-root-after-ignition[812]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 15 18:02:21.010309 kernel: audit: type=1130 audit(1747332140.992:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.010360 kernel: audit: type=1131 audit(1747332140.992:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:20.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:20.992233 systemd[1]: ignition-quench.service: Deactivated successfully. May 15 18:02:21.023709 kernel: audit: type=1130 audit(1747332141.010:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:20.992334 systemd[1]: Finished ignition-quench.service. May 15 18:02:20.997627 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 15 18:02:21.010882 systemd[1]: Reached target ignition-complete.target. May 15 18:02:21.024959 systemd[1]: Starting initrd-parse-etc.service... May 15 18:02:21.048976 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 15 18:02:21.049713 systemd[1]: Finished initrd-parse-etc.service. May 15 18:02:21.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.051701 systemd[1]: Reached target initrd-fs.target. May 15 18:02:21.067957 kernel: audit: type=1130 audit(1747332141.050:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.068005 kernel: audit: type=1131 audit(1747332141.050:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.068320 systemd[1]: Reached target initrd.target. May 15 18:02:21.068888 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 15 18:02:21.069668 systemd[1]: Starting dracut-pre-pivot.service... May 15 18:02:21.087665 systemd[1]: Finished dracut-pre-pivot.service. May 15 18:02:21.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.093232 systemd[1]: Starting initrd-cleanup.service... May 15 18:02:21.094242 kernel: audit: type=1130 audit(1747332141.088:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.103917 systemd[1]: Stopped target nss-lookup.target. May 15 18:02:21.105008 systemd[1]: Stopped target remote-cryptsetup.target. May 15 18:02:21.106150 systemd[1]: Stopped target timers.target. May 15 18:02:21.107180 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 15 18:02:21.107867 systemd[1]: Stopped dracut-pre-pivot.service. May 15 18:02:21.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.113507 systemd[1]: Stopped target initrd.target. May 15 18:02:21.114028 kernel: audit: type=1131 audit(1747332141.108:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.114599 systemd[1]: Stopped target basic.target. May 15 18:02:21.115628 systemd[1]: Stopped target ignition-complete.target. May 15 18:02:21.116708 systemd[1]: Stopped target ignition-diskful.target. May 15 18:02:21.117793 systemd[1]: Stopped target initrd-root-device.target. May 15 18:02:21.118879 systemd[1]: Stopped target remote-fs.target. May 15 18:02:21.119914 systemd[1]: Stopped target remote-fs-pre.target. May 15 18:02:21.121030 systemd[1]: Stopped target sysinit.target. May 15 18:02:21.122255 systemd[1]: Stopped target local-fs.target. May 15 18:02:21.122824 systemd[1]: Stopped target local-fs-pre.target. May 15 18:02:21.123748 systemd[1]: Stopped target swap.target. May 15 18:02:21.124599 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 15 18:02:21.130352 kernel: audit: type=1131 audit(1747332141.124:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.124721 systemd[1]: Stopped dracut-pre-mount.service. May 15 18:02:21.125598 systemd[1]: Stopped target cryptsetup.target. May 15 18:02:21.136665 kernel: audit: type=1131 audit(1747332141.131:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.130841 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 15 18:02:21.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.130940 systemd[1]: Stopped dracut-initqueue.service. May 15 18:02:21.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.131909 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 15 18:02:21.132016 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 15 18:02:21.137281 systemd[1]: ignition-files.service: Deactivated successfully. May 15 18:02:21.137421 systemd[1]: Stopped ignition-files.service. May 15 18:02:21.139118 systemd[1]: Stopping ignition-mount.service... May 15 18:02:21.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.159773 ignition[825]: INFO : Ignition 2.14.0 May 15 18:02:21.159773 ignition[825]: INFO : Stage: umount May 15 18:02:21.159773 ignition[825]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 18:02:21.159773 ignition[825]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 18:02:21.159773 ignition[825]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 18:02:21.159773 ignition[825]: INFO : umount: umount passed May 15 18:02:21.159773 ignition[825]: INFO : Ignition finished successfully May 15 18:02:21.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.165229 iscsid[652]: iscsid shutting down. May 15 18:02:21.147266 systemd[1]: Stopping iscsid.service... May 15 18:02:21.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.150757 systemd[1]: Stopping sysroot-boot.service... May 15 18:02:21.151214 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 15 18:02:21.151344 systemd[1]: Stopped systemd-udev-trigger.service. May 15 18:02:21.152112 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 15 18:02:21.152225 systemd[1]: Stopped dracut-pre-trigger.service. May 15 18:02:21.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.155296 systemd[1]: ignition-mount.service: Deactivated successfully. May 15 18:02:21.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.156716 systemd[1]: Stopped ignition-mount.service. May 15 18:02:21.158823 systemd[1]: iscsid.service: Deactivated successfully. May 15 18:02:21.159213 systemd[1]: Stopped iscsid.service. May 15 18:02:21.160940 systemd[1]: ignition-disks.service: Deactivated successfully. May 15 18:02:21.161042 systemd[1]: Stopped ignition-disks.service. May 15 18:02:21.166916 systemd[1]: ignition-kargs.service: Deactivated successfully. May 15 18:02:21.166957 systemd[1]: Stopped ignition-kargs.service. May 15 18:02:21.167487 systemd[1]: ignition-fetch.service: Deactivated successfully. May 15 18:02:21.167522 systemd[1]: Stopped ignition-fetch.service. May 15 18:02:21.168065 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 15 18:02:21.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.168101 systemd[1]: Stopped ignition-fetch-offline.service. May 15 18:02:21.168595 systemd[1]: Stopped target paths.target. May 15 18:02:21.169012 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 15 18:02:21.172665 systemd[1]: Stopped systemd-ask-password-console.path. May 15 18:02:21.174144 systemd[1]: Stopped target slices.target. May 15 18:02:21.174604 systemd[1]: Stopped target sockets.target. May 15 18:02:21.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.175060 systemd[1]: iscsid.socket: Deactivated successfully. May 15 18:02:21.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.175093 systemd[1]: Closed iscsid.socket. May 15 18:02:21.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.175499 systemd[1]: ignition-setup.service: Deactivated successfully. May 15 18:02:21.175534 systemd[1]: Stopped ignition-setup.service. May 15 18:02:21.176069 systemd[1]: Stopping iscsiuio.service... May 15 18:02:21.177485 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 15 18:02:21.178042 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 15 18:02:21.178130 systemd[1]: Finished initrd-cleanup.service. May 15 18:02:21.179494 systemd[1]: iscsiuio.service: Deactivated successfully. May 15 18:02:21.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.179631 systemd[1]: Stopped iscsiuio.service. May 15 18:02:21.180161 systemd[1]: Stopped target network.target. May 15 18:02:21.211000 audit: BPF prog-id=6 op=UNLOAD May 15 18:02:21.181097 systemd[1]: iscsiuio.socket: Deactivated successfully. May 15 18:02:21.181127 systemd[1]: Closed iscsiuio.socket. May 15 18:02:21.182135 systemd[1]: Stopping systemd-networkd.service... May 15 18:02:21.183169 systemd[1]: Stopping systemd-resolved.service... May 15 18:02:21.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.188828 systemd-networkd[643]: eth0: DHCPv6 lease lost May 15 18:02:21.215000 audit: BPF prog-id=9 op=UNLOAD May 15 18:02:21.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.190578 systemd[1]: systemd-networkd.service: Deactivated successfully. May 15 18:02:21.190664 systemd[1]: Stopped systemd-networkd.service. May 15 18:02:21.192299 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 15 18:02:21.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.192333 systemd[1]: Closed systemd-networkd.socket. May 15 18:02:21.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.195759 systemd[1]: Stopping network-cleanup.service... May 15 18:02:21.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.196571 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 15 18:02:21.196618 systemd[1]: Stopped parse-ip-for-networkd.service. May 15 18:02:21.198837 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 15 18:02:21.198878 systemd[1]: Stopped systemd-sysctl.service. May 15 18:02:21.199965 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 15 18:02:21.200001 systemd[1]: Stopped systemd-modules-load.service. May 15 18:02:21.200753 systemd[1]: Stopping systemd-udevd.service... May 15 18:02:21.208685 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 15 18:02:21.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.209188 systemd[1]: systemd-resolved.service: Deactivated successfully. May 15 18:02:21.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.209293 systemd[1]: Stopped systemd-resolved.service. May 15 18:02:21.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.213306 systemd[1]: network-cleanup.service: Deactivated successfully. May 15 18:02:21.213398 systemd[1]: Stopped network-cleanup.service. May 15 18:02:21.215354 systemd[1]: systemd-udevd.service: Deactivated successfully. May 15 18:02:21.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.215463 systemd[1]: Stopped systemd-udevd.service. May 15 18:02:21.216350 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 15 18:02:21.216386 systemd[1]: Closed systemd-udevd-control.socket. May 15 18:02:21.217063 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 15 18:02:21.217091 systemd[1]: Closed systemd-udevd-kernel.socket. May 15 18:02:21.218098 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 15 18:02:21.218137 systemd[1]: Stopped dracut-pre-udev.service. May 15 18:02:21.219043 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 15 18:02:21.219078 systemd[1]: Stopped dracut-cmdline.service. May 15 18:02:21.220127 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 15 18:02:21.220164 systemd[1]: Stopped dracut-cmdline-ask.service. May 15 18:02:21.221700 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 15 18:02:21.228237 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 15 18:02:21.228304 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 15 18:02:21.229646 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 15 18:02:21.229701 systemd[1]: Stopped kmod-static-nodes.service. May 15 18:02:21.230347 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 15 18:02:21.230386 systemd[1]: Stopped systemd-vconsole-setup.service. May 15 18:02:21.232199 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 15 18:02:21.232719 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 15 18:02:21.232811 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 15 18:02:21.424059 systemd[1]: sysroot-boot.service: Deactivated successfully. May 15 18:02:21.424283 systemd[1]: Stopped sysroot-boot.service. May 15 18:02:21.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.427291 systemd[1]: Reached target initrd-switch-root.target. May 15 18:02:21.429359 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 15 18:02:21.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:21.429457 systemd[1]: Stopped initrd-setup-root.service. May 15 18:02:21.433365 systemd[1]: Starting initrd-switch-root.service... May 15 18:02:21.477105 systemd[1]: Switching root. May 15 18:02:21.508940 systemd-journald[185]: Journal stopped May 15 18:02:25.946300 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). May 15 18:02:25.946387 kernel: SELinux: Class mctp_socket not defined in policy. May 15 18:02:25.947306 kernel: SELinux: Class anon_inode not defined in policy. May 15 18:02:25.947337 kernel: SELinux: the above unknown classes and permissions will be allowed May 15 18:02:25.947356 kernel: SELinux: policy capability network_peer_controls=1 May 15 18:02:25.947373 kernel: SELinux: policy capability open_perms=1 May 15 18:02:25.947390 kernel: SELinux: policy capability extended_socket_class=1 May 15 18:02:25.947409 kernel: SELinux: policy capability always_check_network=0 May 15 18:02:25.947433 kernel: SELinux: policy capability cgroup_seclabel=1 May 15 18:02:25.947452 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 15 18:02:25.947470 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 15 18:02:25.947488 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 15 18:02:25.947508 systemd[1]: Successfully loaded SELinux policy in 98.210ms. May 15 18:02:25.947538 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.060ms. May 15 18:02:25.947584 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 18:02:25.947603 systemd[1]: Detected virtualization kvm. May 15 18:02:25.947623 systemd[1]: Detected architecture x86-64. May 15 18:02:25.947641 systemd[1]: Detected first boot. May 15 18:02:25.947661 systemd[1]: Hostname set to . May 15 18:02:25.947681 systemd[1]: Initializing machine ID from VM UUID. May 15 18:02:25.947700 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 15 18:02:25.947728 systemd[1]: Populated /etc with preset unit settings. May 15 18:02:25.947749 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 18:02:25.947772 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 18:02:25.947793 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 18:02:25.947814 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 15 18:02:25.947836 systemd[1]: Stopped initrd-switch-root.service. May 15 18:02:25.947859 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 15 18:02:25.947879 systemd[1]: Created slice system-addon\x2dconfig.slice. May 15 18:02:25.947898 systemd[1]: Created slice system-addon\x2drun.slice. May 15 18:02:25.947918 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 15 18:02:25.947937 systemd[1]: Created slice system-getty.slice. May 15 18:02:25.947956 systemd[1]: Created slice system-modprobe.slice. May 15 18:02:25.947976 systemd[1]: Created slice system-serial\x2dgetty.slice. May 15 18:02:25.947995 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 15 18:02:25.948015 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 15 18:02:25.948039 systemd[1]: Created slice user.slice. May 15 18:02:25.948060 systemd[1]: Started systemd-ask-password-console.path. May 15 18:02:25.948079 systemd[1]: Started systemd-ask-password-wall.path. May 15 18:02:25.948097 systemd[1]: Set up automount boot.automount. May 15 18:02:25.948119 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 15 18:02:25.948139 systemd[1]: Stopped target initrd-switch-root.target. May 15 18:02:25.948160 systemd[1]: Stopped target initrd-fs.target. May 15 18:02:25.948180 systemd[1]: Stopped target initrd-root-fs.target. May 15 18:02:25.948199 systemd[1]: Reached target integritysetup.target. May 15 18:02:25.948219 systemd[1]: Reached target remote-cryptsetup.target. May 15 18:02:25.948239 systemd[1]: Reached target remote-fs.target. May 15 18:02:25.948258 systemd[1]: Reached target slices.target. May 15 18:02:25.948277 systemd[1]: Reached target swap.target. May 15 18:02:25.948296 systemd[1]: Reached target torcx.target. May 15 18:02:25.948315 systemd[1]: Reached target veritysetup.target. May 15 18:02:25.948334 systemd[1]: Listening on systemd-coredump.socket. May 15 18:02:25.948355 systemd[1]: Listening on systemd-initctl.socket. May 15 18:02:25.948375 systemd[1]: Listening on systemd-networkd.socket. May 15 18:02:25.948394 systemd[1]: Listening on systemd-udevd-control.socket. May 15 18:02:25.948413 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 18:02:25.948433 systemd[1]: Listening on systemd-userdbd.socket. May 15 18:02:25.948452 systemd[1]: Mounting dev-hugepages.mount... May 15 18:02:25.948475 systemd[1]: Mounting dev-mqueue.mount... May 15 18:02:25.948494 systemd[1]: Mounting media.mount... May 15 18:02:25.948515 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 18:02:25.948537 systemd[1]: Mounting sys-kernel-debug.mount... May 15 18:02:25.950682 systemd[1]: Mounting sys-kernel-tracing.mount... May 15 18:02:25.950718 systemd[1]: Mounting tmp.mount... May 15 18:02:25.950739 systemd[1]: Starting flatcar-tmpfiles.service... May 15 18:02:25.950759 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 18:02:25.950779 systemd[1]: Starting kmod-static-nodes.service... May 15 18:02:25.950799 systemd[1]: Starting modprobe@configfs.service... May 15 18:02:25.950819 systemd[1]: Starting modprobe@dm_mod.service... May 15 18:02:25.950838 systemd[1]: Starting modprobe@drm.service... May 15 18:02:25.950862 systemd[1]: Starting modprobe@efi_pstore.service... May 15 18:02:25.950881 systemd[1]: Starting modprobe@fuse.service... May 15 18:02:25.950900 systemd[1]: Starting modprobe@loop.service... May 15 18:02:25.950921 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 15 18:02:25.950940 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 15 18:02:25.950960 systemd[1]: Stopped systemd-fsck-root.service. May 15 18:02:25.950979 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 15 18:02:25.950998 systemd[1]: Stopped systemd-fsck-usr.service. May 15 18:02:25.951017 systemd[1]: Stopped systemd-journald.service. May 15 18:02:25.951046 systemd[1]: Starting systemd-journald.service... May 15 18:02:25.951065 systemd[1]: Starting systemd-modules-load.service... May 15 18:02:25.951084 systemd[1]: Starting systemd-network-generator.service... May 15 18:02:25.951104 systemd[1]: Starting systemd-remount-fs.service... May 15 18:02:25.951124 systemd[1]: Starting systemd-udev-trigger.service... May 15 18:02:25.951143 systemd[1]: verity-setup.service: Deactivated successfully. May 15 18:02:25.951162 systemd[1]: Stopped verity-setup.service. May 15 18:02:25.951182 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 18:02:25.951201 systemd[1]: Mounted dev-hugepages.mount. May 15 18:02:25.951222 systemd[1]: Mounted dev-mqueue.mount. May 15 18:02:25.951242 systemd[1]: Mounted media.mount. May 15 18:02:25.951267 systemd[1]: Mounted sys-kernel-debug.mount. May 15 18:02:25.951293 systemd-journald[923]: Journal started May 15 18:02:25.951367 systemd-journald[923]: Runtime Journal (/run/log/journal/253c1d2fe8444f6aa6ea3391e82220be) is 8.0M, max 78.4M, 70.4M free. May 15 18:02:21.837000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 18:02:21.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 18:02:21.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 18:02:21.965000 audit: BPF prog-id=10 op=LOAD May 15 18:02:21.965000 audit: BPF prog-id=10 op=UNLOAD May 15 18:02:21.965000 audit: BPF prog-id=11 op=LOAD May 15 18:02:21.965000 audit: BPF prog-id=11 op=UNLOAD May 15 18:02:22.102000 audit[858]: AVC avc: denied { associate } for pid=858 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 18:02:22.102000 audit[858]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058c2 a1=c00002ae40 a2=c000029080 a3=32 items=0 ppid=841 pid=858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:02:22.102000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 18:02:22.105000 audit[858]: AVC avc: denied { associate } for pid=858 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 18:02:22.105000 audit[858]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000105999 a2=1ed a3=0 items=2 ppid=841 pid=858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:02:22.105000 audit: CWD cwd="/" May 15 18:02:22.105000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:22.105000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:22.105000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 18:02:25.762000 audit: BPF prog-id=12 op=LOAD May 15 18:02:25.762000 audit: BPF prog-id=3 op=UNLOAD May 15 18:02:25.762000 audit: BPF prog-id=13 op=LOAD May 15 18:02:25.762000 audit: BPF prog-id=14 op=LOAD May 15 18:02:25.762000 audit: BPF prog-id=4 op=UNLOAD May 15 18:02:25.762000 audit: BPF prog-id=5 op=UNLOAD May 15 18:02:25.763000 audit: BPF prog-id=15 op=LOAD May 15 18:02:25.763000 audit: BPF prog-id=12 op=UNLOAD May 15 18:02:25.763000 audit: BPF prog-id=16 op=LOAD May 15 18:02:25.763000 audit: BPF prog-id=17 op=LOAD May 15 18:02:25.763000 audit: BPF prog-id=13 op=UNLOAD May 15 18:02:25.763000 audit: BPF prog-id=14 op=UNLOAD May 15 18:02:25.764000 audit: BPF prog-id=18 op=LOAD May 15 18:02:25.764000 audit: BPF prog-id=15 op=UNLOAD May 15 18:02:25.764000 audit: BPF prog-id=19 op=LOAD May 15 18:02:25.764000 audit: BPF prog-id=20 op=LOAD May 15 18:02:25.764000 audit: BPF prog-id=16 op=UNLOAD May 15 18:02:25.764000 audit: BPF prog-id=17 op=UNLOAD May 15 18:02:25.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:25.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:25.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:25.772000 audit: BPF prog-id=18 op=UNLOAD May 15 18:02:25.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:25.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:25.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:25.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:25.903000 audit: BPF prog-id=21 op=LOAD May 15 18:02:25.903000 audit: BPF prog-id=22 op=LOAD May 15 18:02:25.903000 audit: BPF prog-id=23 op=LOAD May 15 18:02:25.903000 audit: BPF prog-id=19 op=UNLOAD May 15 18:02:25.903000 audit: BPF prog-id=20 op=UNLOAD May 15 18:02:25.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:25.943000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 15 18:02:25.943000 audit[923]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffe57220390 a2=4000 a3=7ffe5722042c items=0 ppid=1 pid=923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:02:25.943000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 15 18:02:25.760792 systemd[1]: Queued start job for default target multi-user.target. May 15 18:02:25.958704 systemd[1]: Started systemd-journald.service. May 15 18:02:25.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:22.099937 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T18:02:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 18:02:25.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:25.760805 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 15 18:02:22.100907 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T18:02:22Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 18:02:25.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:25.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:25.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:25.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:25.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:25.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:25.765267 systemd[1]: systemd-journald.service: Deactivated successfully. May 15 18:02:22.100931 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T18:02:22Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 18:02:25.956479 systemd[1]: Mounted sys-kernel-tracing.mount. May 15 18:02:22.100967 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T18:02:22Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 15 18:02:25.957059 systemd[1]: Mounted tmp.mount. May 15 18:02:25.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:25.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:22.100980 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T18:02:22Z" level=debug msg="skipped missing lower profile" missing profile=oem May 15 18:02:25.957811 systemd[1]: Finished kmod-static-nodes.service. May 15 18:02:22.101013 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T18:02:22Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 15 18:02:25.959770 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 15 18:02:25.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:25.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:22.101029 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T18:02:22Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 15 18:02:25.959898 systemd[1]: Finished modprobe@configfs.service. May 15 18:02:22.101239 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T18:02:22Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 15 18:02:25.960759 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 18:02:22.101285 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T18:02:22Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 18:02:25.960886 systemd[1]: Finished modprobe@dm_mod.service. May 15 18:02:25.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:22.101300 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T18:02:22Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 18:02:25.961764 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 18:02:22.102304 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T18:02:22Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 15 18:02:25.961880 systemd[1]: Finished modprobe@drm.service. May 15 18:02:22.102346 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T18:02:22Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 15 18:02:25.962595 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 18:02:22.102367 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T18:02:22Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.100: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.100 May 15 18:02:25.962711 systemd[1]: Finished modprobe@efi_pstore.service. May 15 18:02:22.102384 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T18:02:22Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 15 18:02:25.963944 systemd[1]: Finished systemd-modules-load.service. May 15 18:02:22.102402 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T18:02:22Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.100: no such file or directory" path=/var/lib/torcx/store/3510.3.100 May 15 18:02:25.964692 systemd[1]: Finished systemd-network-generator.service. May 15 18:02:22.102417 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T18:02:22Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 15 18:02:25.968923 systemd[1]: Finished systemd-remount-fs.service. May 15 18:02:25.327746 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T18:02:25Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 18:02:25.969975 systemd[1]: Reached target network-pre.target. May 15 18:02:25.328123 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T18:02:25Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 18:02:25.971628 systemd[1]: Mounting sys-kernel-config.mount... May 15 18:02:25.328271 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T18:02:25Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 18:02:25.328523 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T18:02:25Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 18:02:25.328612 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T18:02:25Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 15 18:02:25.328692 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T18:02:25Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 15 18:02:25.974390 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 15 18:02:25.977073 systemd[1]: Starting systemd-hwdb-update.service... May 15 18:02:25.996446 systemd-journald[923]: Time spent on flushing to /var/log/journal/253c1d2fe8444f6aa6ea3391e82220be is 44.787ms for 1076 entries. May 15 18:02:25.996446 systemd-journald[923]: System Journal (/var/log/journal/253c1d2fe8444f6aa6ea3391e82220be) is 8.0M, max 584.8M, 576.8M free. May 15 18:02:26.096294 systemd-journald[923]: Received client request to flush runtime journal. May 15 18:02:26.096341 kernel: loop: module loaded May 15 18:02:26.096367 kernel: kauditd_printk_skb: 97 callbacks suppressed May 15 18:02:26.096387 kernel: audit: type=1130 audit(1747332146.003:136): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:26.096408 kernel: fuse: init (API version 7.34) May 15 18:02:26.096425 kernel: audit: type=1131 audit(1747332146.003:137): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:26.096444 kernel: audit: type=1130 audit(1747332146.022:138): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:26.096462 kernel: audit: type=1130 audit(1747332146.029:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:26.096479 kernel: audit: type=1131 audit(1747332146.029:140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:26.096510 kernel: audit: type=1130 audit(1747332146.048:141): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:26.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:26.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:26.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:26.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:26.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:26.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:25.978679 systemd[1]: Starting systemd-journal-flush.service... May 15 18:02:26.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:26.104630 kernel: audit: type=1130 audit(1747332146.098:142): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:25.981749 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 18:02:25.982835 systemd[1]: Starting systemd-random-seed.service... May 15 18:02:25.984397 systemd[1]: Starting systemd-sysctl.service... May 15 18:02:25.986217 systemd[1]: Mounted sys-kernel-config.mount. May 15 18:02:26.003825 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 18:02:26.004004 systemd[1]: Finished modprobe@loop.service. May 15 18:02:26.004624 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 18:02:26.022712 systemd[1]: Finished systemd-random-seed.service. May 15 18:02:26.023584 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 15 18:02:26.023729 systemd[1]: Finished modprobe@fuse.service. May 15 18:02:26.029844 systemd[1]: Reached target first-boot-complete.target. May 15 18:02:26.031975 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 15 18:02:26.036473 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 15 18:02:26.040983 systemd[1]: Finished systemd-sysctl.service. May 15 18:02:26.098455 systemd[1]: Finished systemd-journal-flush.service. May 15 18:02:26.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:26.124009 systemd[1]: Finished flatcar-tmpfiles.service. May 15 18:02:26.125761 systemd[1]: Starting systemd-sysusers.service... May 15 18:02:26.131970 kernel: audit: type=1130 audit(1747332146.123:143): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:26.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:26.134255 systemd[1]: Finished systemd-udev-trigger.service. May 15 18:02:26.135884 systemd[1]: Starting systemd-udev-settle.service... May 15 18:02:26.140942 kernel: audit: type=1130 audit(1747332146.134:144): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:26.149404 udevadm[967]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 15 18:02:26.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:26.178929 systemd[1]: Finished systemd-sysusers.service. May 15 18:02:26.180575 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 18:02:26.185574 kernel: audit: type=1130 audit(1747332146.178:145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:26.224173 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 18:02:26.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:26.642804 systemd[1]: Finished systemd-hwdb-update.service. May 15 18:02:26.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:26.644000 audit: BPF prog-id=24 op=LOAD May 15 18:02:26.645000 audit: BPF prog-id=25 op=LOAD May 15 18:02:26.645000 audit: BPF prog-id=7 op=UNLOAD May 15 18:02:26.645000 audit: BPF prog-id=8 op=UNLOAD May 15 18:02:26.646912 systemd[1]: Starting systemd-udevd.service... May 15 18:02:26.690417 systemd-udevd[970]: Using default interface naming scheme 'v252'. May 15 18:02:26.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:26.756103 systemd[1]: Started systemd-udevd.service. May 15 18:02:26.761000 audit: BPF prog-id=26 op=LOAD May 15 18:02:26.765923 systemd[1]: Starting systemd-networkd.service... May 15 18:02:26.792000 audit: BPF prog-id=27 op=LOAD May 15 18:02:26.792000 audit: BPF prog-id=28 op=LOAD May 15 18:02:26.792000 audit: BPF prog-id=29 op=LOAD May 15 18:02:26.794873 systemd[1]: Starting systemd-userdbd.service... May 15 18:02:26.835207 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 15 18:02:26.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:26.849469 systemd[1]: Started systemd-userdbd.service. May 15 18:02:26.881570 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 15 18:02:26.899566 kernel: ACPI: button: Power Button [PWRF] May 15 18:02:26.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:26.952589 systemd-networkd[982]: lo: Link UP May 15 18:02:26.952598 systemd-networkd[982]: lo: Gained carrier May 15 18:02:26.953026 systemd-networkd[982]: Enumeration completed May 15 18:02:26.953108 systemd[1]: Started systemd-networkd.service. May 15 18:02:26.954939 systemd-networkd[982]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 18:02:26.956880 systemd-networkd[982]: eth0: Link UP May 15 18:02:26.956886 systemd-networkd[982]: eth0: Gained carrier May 15 18:02:26.937000 audit[976]: AVC avc: denied { confidentiality } for pid=976 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 15 18:02:26.937000 audit[976]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ba83a58e70 a1=338ac a2=7f8232e82bc5 a3=5 items=110 ppid=970 pid=976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:02:26.937000 audit: CWD cwd="/" May 15 18:02:26.937000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=1 name=(null) inode=13234 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=2 name=(null) inode=13234 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=3 name=(null) inode=13235 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=4 name=(null) inode=13234 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=5 name=(null) inode=13236 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=6 name=(null) inode=13234 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=7 name=(null) inode=13237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=8 name=(null) inode=13237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=9 name=(null) inode=13238 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=10 name=(null) inode=13237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.965743 systemd-networkd[982]: eth0: DHCPv4 address 172.24.4.194/24, gateway 172.24.4.1 acquired from 172.24.4.1 May 15 18:02:26.937000 audit: PATH item=11 name=(null) inode=13239 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=12 name=(null) inode=13237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=13 name=(null) inode=13240 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=14 name=(null) inode=13237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=15 name=(null) inode=13241 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=16 name=(null) inode=13237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=17 name=(null) inode=13242 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=18 name=(null) inode=13234 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=19 name=(null) inode=13243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=20 name=(null) inode=13243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=21 name=(null) inode=13244 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=22 name=(null) inode=13243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=23 name=(null) inode=13245 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=24 name=(null) inode=13243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=25 name=(null) inode=13246 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=26 name=(null) inode=13243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=27 name=(null) inode=13247 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=28 name=(null) inode=13243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=29 name=(null) inode=13248 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=30 name=(null) inode=13234 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=31 name=(null) inode=13249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=32 name=(null) inode=13249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=33 name=(null) inode=13250 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=34 name=(null) inode=13249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=35 name=(null) inode=13251 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=36 name=(null) inode=13249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=37 name=(null) inode=13252 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=38 name=(null) inode=13249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=39 name=(null) inode=13253 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=40 name=(null) inode=13249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=41 name=(null) inode=13254 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=42 name=(null) inode=13234 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=43 name=(null) inode=13255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=44 name=(null) inode=13255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=45 name=(null) inode=13256 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=46 name=(null) inode=13255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=47 name=(null) inode=13257 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=48 name=(null) inode=13255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=49 name=(null) inode=13258 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=50 name=(null) inode=13255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=51 name=(null) inode=13259 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=52 name=(null) inode=13255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=53 name=(null) inode=13260 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=55 name=(null) inode=13261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=56 name=(null) inode=13261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=57 name=(null) inode=13262 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=58 name=(null) inode=13261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=59 name=(null) inode=13263 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=60 name=(null) inode=13261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=61 name=(null) inode=13264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=62 name=(null) inode=13264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=63 name=(null) inode=13265 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=64 name=(null) inode=13264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=65 name=(null) inode=13266 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=66 name=(null) inode=13264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=67 name=(null) inode=13267 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=68 name=(null) inode=13264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=69 name=(null) inode=13268 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=70 name=(null) inode=13264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=71 name=(null) inode=13269 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=72 name=(null) inode=13261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=73 name=(null) inode=13270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=74 name=(null) inode=13270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=75 name=(null) inode=13271 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=76 name=(null) inode=13270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=77 name=(null) inode=13272 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=78 name=(null) inode=13270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=79 name=(null) inode=13273 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=80 name=(null) inode=13270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=81 name=(null) inode=13274 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=82 name=(null) inode=13270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=83 name=(null) inode=13275 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=84 name=(null) inode=13261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=85 name=(null) inode=13276 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=86 name=(null) inode=13276 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=87 name=(null) inode=13277 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=88 name=(null) inode=13276 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=89 name=(null) inode=13278 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=90 name=(null) inode=13276 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=91 name=(null) inode=13279 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=92 name=(null) inode=13276 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=93 name=(null) inode=13280 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=94 name=(null) inode=13276 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=95 name=(null) inode=13281 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=96 name=(null) inode=13261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=97 name=(null) inode=13282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=98 name=(null) inode=13282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=99 name=(null) inode=13283 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=100 name=(null) inode=13282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=101 name=(null) inode=13284 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=102 name=(null) inode=13282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=103 name=(null) inode=13285 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=104 name=(null) inode=13282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=105 name=(null) inode=13286 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=106 name=(null) inode=13282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=107 name=(null) inode=13287 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PATH item=109 name=(null) inode=13288 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:02:26.937000 audit: PROCTITLE proctitle="(udev-worker)" May 15 18:02:26.983614 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 May 15 18:02:26.989289 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 15 18:02:26.988660 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 18:02:26.993578 kernel: mousedev: PS/2 mouse device common for all mice May 15 18:02:27.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:27.046997 systemd[1]: Finished systemd-udev-settle.service. May 15 18:02:27.048709 systemd[1]: Starting lvm2-activation-early.service... May 15 18:02:27.079940 lvm[1004]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 18:02:27.109979 systemd[1]: Finished lvm2-activation-early.service. May 15 18:02:27.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:27.111376 systemd[1]: Reached target cryptsetup.target. May 15 18:02:27.114915 systemd[1]: Starting lvm2-activation.service... May 15 18:02:27.119015 lvm[1005]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 18:02:27.143799 systemd[1]: Finished lvm2-activation.service. May 15 18:02:27.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:27.145147 systemd[1]: Reached target local-fs-pre.target. May 15 18:02:27.146363 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 15 18:02:27.146423 systemd[1]: Reached target local-fs.target. May 15 18:02:27.147594 systemd[1]: Reached target machines.target. May 15 18:02:27.151151 systemd[1]: Starting ldconfig.service... May 15 18:02:27.154602 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 18:02:27.154696 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 18:02:27.156772 systemd[1]: Starting systemd-boot-update.service... May 15 18:02:27.159973 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 15 18:02:27.164615 systemd[1]: Starting systemd-machine-id-commit.service... May 15 18:02:27.169783 systemd[1]: Starting systemd-sysext.service... May 15 18:02:27.179365 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1007 (bootctl) May 15 18:02:27.181919 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 15 18:02:27.214335 systemd[1]: Unmounting usr-share-oem.mount... May 15 18:02:27.246632 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 15 18:02:27.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:27.271817 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 15 18:02:27.272203 systemd[1]: Unmounted usr-share-oem.mount. May 15 18:02:27.348639 kernel: loop0: detected capacity change from 0 to 210664 May 15 18:02:27.464953 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 15 18:02:27.466307 systemd[1]: Finished systemd-machine-id-commit.service. May 15 18:02:27.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:27.522628 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 15 18:02:27.556649 kernel: loop1: detected capacity change from 0 to 210664 May 15 18:02:27.608497 (sd-sysext)[1021]: Using extensions 'kubernetes'. May 15 18:02:27.611959 (sd-sysext)[1021]: Merged extensions into '/usr'. May 15 18:02:27.659054 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 18:02:27.667770 systemd[1]: Mounting usr-share-oem.mount... May 15 18:02:27.669388 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 18:02:27.674660 systemd[1]: Starting modprobe@dm_mod.service... May 15 18:02:27.679831 systemd[1]: Starting modprobe@efi_pstore.service... May 15 18:02:27.681708 systemd-fsck[1018]: fsck.fat 4.2 (2021-01-31) May 15 18:02:27.681708 systemd-fsck[1018]: /dev/vda1: 790 files, 120732/258078 clusters May 15 18:02:27.684103 systemd[1]: Starting modprobe@loop.service... May 15 18:02:27.685351 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 18:02:27.685568 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 18:02:27.685723 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 18:02:27.688847 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 15 18:02:27.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:27.689885 systemd[1]: Mounted usr-share-oem.mount. May 15 18:02:27.690744 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 18:02:27.690878 systemd[1]: Finished modprobe@dm_mod.service. May 15 18:02:27.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:27.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:27.691837 systemd[1]: Finished systemd-sysext.service. May 15 18:02:27.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:27.692919 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 18:02:27.693050 systemd[1]: Finished modprobe@efi_pstore.service. May 15 18:02:27.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:27.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:27.693794 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 18:02:27.693949 systemd[1]: Finished modprobe@loop.service. May 15 18:02:27.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:27.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:27.698053 systemd[1]: Mounting boot.mount... May 15 18:02:27.704706 systemd[1]: Starting ensure-sysext.service... May 15 18:02:27.705343 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 18:02:27.705412 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 18:02:27.706724 systemd[1]: Starting systemd-tmpfiles-setup.service... May 15 18:02:27.713039 systemd[1]: Reloading. May 15 18:02:27.724094 systemd-tmpfiles[1029]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 15 18:02:27.726104 systemd-tmpfiles[1029]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 15 18:02:27.728940 systemd-tmpfiles[1029]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 15 18:02:27.778994 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-05-15T18:02:27Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 18:02:27.779333 /usr/lib/systemd/system-generators/torcx-generator[1048]: time="2025-05-15T18:02:27Z" level=info msg="torcx already run" May 15 18:02:27.938358 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 18:02:27.938384 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 18:02:27.971776 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 18:02:28.039000 audit: BPF prog-id=30 op=LOAD May 15 18:02:28.039000 audit: BPF prog-id=27 op=UNLOAD May 15 18:02:28.039000 audit: BPF prog-id=31 op=LOAD May 15 18:02:28.039000 audit: BPF prog-id=32 op=LOAD May 15 18:02:28.039000 audit: BPF prog-id=28 op=UNLOAD May 15 18:02:28.039000 audit: BPF prog-id=29 op=UNLOAD May 15 18:02:28.040000 audit: BPF prog-id=33 op=LOAD May 15 18:02:28.040000 audit: BPF prog-id=21 op=UNLOAD May 15 18:02:28.040000 audit: BPF prog-id=34 op=LOAD May 15 18:02:28.040000 audit: BPF prog-id=35 op=LOAD May 15 18:02:28.040000 audit: BPF prog-id=22 op=UNLOAD May 15 18:02:28.040000 audit: BPF prog-id=23 op=UNLOAD May 15 18:02:28.043000 audit: BPF prog-id=36 op=LOAD May 15 18:02:28.043000 audit: BPF prog-id=37 op=LOAD May 15 18:02:28.043000 audit: BPF prog-id=24 op=UNLOAD May 15 18:02:28.043000 audit: BPF prog-id=25 op=UNLOAD May 15 18:02:28.045000 audit: BPF prog-id=38 op=LOAD May 15 18:02:28.045000 audit: BPF prog-id=26 op=UNLOAD May 15 18:02:28.049989 systemd[1]: Mounted boot.mount. May 15 18:02:28.067183 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 18:02:28.067398 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 18:02:28.068907 systemd[1]: Starting modprobe@dm_mod.service... May 15 18:02:28.071208 systemd[1]: Starting modprobe@efi_pstore.service... May 15 18:02:28.073530 systemd[1]: Starting modprobe@loop.service... May 15 18:02:28.075799 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 18:02:28.075938 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 18:02:28.076089 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 18:02:28.077449 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 18:02:28.077611 systemd[1]: Finished modprobe@dm_mod.service. May 15 18:02:28.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.078779 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 18:02:28.078891 systemd[1]: Finished modprobe@efi_pstore.service. May 15 18:02:28.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.081144 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 18:02:28.081270 systemd[1]: Finished modprobe@loop.service. May 15 18:02:28.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.084239 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 18:02:28.084351 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 18:02:28.086277 systemd[1]: Finished systemd-boot-update.service. May 15 18:02:28.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.088920 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 18:02:28.089142 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 18:02:28.091240 systemd[1]: Starting modprobe@dm_mod.service... May 15 18:02:28.094355 systemd[1]: Starting modprobe@efi_pstore.service... May 15 18:02:28.097036 systemd[1]: Starting modprobe@loop.service... May 15 18:02:28.097615 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 18:02:28.097766 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 18:02:28.097897 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 18:02:28.099379 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 18:02:28.099681 systemd[1]: Finished modprobe@dm_mod.service. May 15 18:02:28.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.101019 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 18:02:28.101144 systemd[1]: Finished modprobe@efi_pstore.service. May 15 18:02:28.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.102523 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 18:02:28.102670 systemd[1]: Finished modprobe@loop.service. May 15 18:02:28.105896 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 18:02:28.106167 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 18:02:28.107435 systemd[1]: Starting modprobe@dm_mod.service... May 15 18:02:28.110450 systemd[1]: Starting modprobe@drm.service... May 15 18:02:28.112301 systemd[1]: Starting modprobe@efi_pstore.service... May 15 18:02:28.115198 systemd[1]: Starting modprobe@loop.service... May 15 18:02:28.116942 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 18:02:28.117073 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 18:02:28.118386 systemd[1]: Starting systemd-networkd-wait-online.service... May 15 18:02:28.119030 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 18:02:28.120375 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 18:02:28.120515 systemd[1]: Finished modprobe@dm_mod.service. May 15 18:02:28.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.122048 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 18:02:28.122185 systemd[1]: Finished modprobe@drm.service. May 15 18:02:28.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.123699 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 18:02:28.123816 systemd[1]: Finished modprobe@efi_pstore.service. May 15 18:02:28.124662 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 18:02:28.124766 systemd[1]: Finished modprobe@loop.service. May 15 18:02:28.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.125894 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 18:02:28.127369 ldconfig[1006]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 15 18:02:28.126001 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 18:02:28.128164 systemd[1]: Finished ensure-sysext.service. May 15 18:02:28.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.137410 systemd[1]: Finished ldconfig.service. May 15 18:02:28.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.183399 systemd[1]: Finished systemd-tmpfiles-setup.service. May 15 18:02:28.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.187044 systemd[1]: Starting audit-rules.service... May 15 18:02:28.190278 systemd[1]: Starting clean-ca-certificates.service... May 15 18:02:28.200610 systemd[1]: Starting systemd-journal-catalog-update.service... May 15 18:02:28.203000 audit: BPF prog-id=39 op=LOAD May 15 18:02:28.205391 systemd[1]: Starting systemd-resolved.service... May 15 18:02:28.208000 audit: BPF prog-id=40 op=LOAD May 15 18:02:28.212005 systemd[1]: Starting systemd-timesyncd.service... May 15 18:02:28.217535 systemd[1]: Starting systemd-update-utmp.service... May 15 18:02:28.219719 systemd[1]: Finished clean-ca-certificates.service. May 15 18:02:28.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.222435 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 18:02:28.230000 audit[1119]: SYSTEM_BOOT pid=1119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 15 18:02:28.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.237792 systemd[1]: Finished systemd-update-utmp.service. May 15 18:02:28.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.267021 systemd[1]: Finished systemd-journal-catalog-update.service. May 15 18:02:28.268979 systemd[1]: Starting systemd-update-done.service... May 15 18:02:28.275759 systemd[1]: Finished systemd-update-done.service. May 15 18:02:28.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:28.285000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 15 18:02:28.285000 audit[1127]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc3aa254a0 a2=420 a3=0 items=0 ppid=1107 pid=1127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:02:28.285000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 15 18:02:28.285837 augenrules[1127]: No rules May 15 18:02:28.286319 systemd[1]: Finished audit-rules.service. May 15 18:02:28.303779 systemd-resolved[1116]: Positive Trust Anchors: May 15 18:02:28.304077 systemd-resolved[1116]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 18:02:28.304169 systemd-resolved[1116]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 18:02:28.309643 systemd[1]: Started systemd-timesyncd.service. May 15 18:02:28.310239 systemd[1]: Reached target time-set.target. May 15 18:02:28.314803 systemd-networkd[982]: eth0: Gained IPv6LL May 15 18:02:28.316179 systemd-resolved[1116]: Using system hostname 'ci-3510-3-100-e9c60cb6b7.novalocal'. May 15 18:02:28.316401 systemd[1]: Finished systemd-networkd-wait-online.service. May 15 18:02:28.317599 systemd[1]: Started systemd-resolved.service. May 15 18:02:28.318178 systemd[1]: Reached target network.target. May 15 18:02:28.318714 systemd[1]: Reached target network-online.target. May 15 18:02:28.319199 systemd[1]: Reached target nss-lookup.target. May 15 18:02:28.319649 systemd[1]: Reached target sysinit.target. May 15 18:02:28.320145 systemd[1]: Started motdgen.path. May 15 18:02:28.320672 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 15 18:02:28.321291 systemd[1]: Started logrotate.timer. May 15 18:02:28.321929 systemd[1]: Started mdadm.timer. May 15 18:02:28.322346 systemd[1]: Started systemd-tmpfiles-clean.timer. May 15 18:02:28.322892 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 15 18:02:28.322919 systemd[1]: Reached target paths.target. May 15 18:02:28.323341 systemd[1]: Reached target timers.target. May 15 18:02:28.324350 systemd[1]: Listening on dbus.socket. May 15 18:02:28.325898 systemd[1]: Starting docker.socket... May 15 18:02:28.329465 systemd[1]: Listening on sshd.socket. May 15 18:02:28.330046 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 18:02:28.330449 systemd[1]: Listening on docker.socket. May 15 18:02:28.330999 systemd[1]: Reached target sockets.target. May 15 18:02:28.331442 systemd[1]: Reached target basic.target. May 15 18:02:28.331965 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 18:02:28.331996 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 18:02:28.332929 systemd[1]: Starting containerd.service... May 15 18:02:28.335185 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 15 18:02:28.336671 systemd[1]: Starting dbus.service... May 15 18:02:28.338485 systemd[1]: Starting enable-oem-cloudinit.service... May 15 18:02:28.339995 systemd[1]: Starting extend-filesystems.service... May 15 18:02:28.341043 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 15 18:02:28.344799 systemd[1]: Starting kubelet.service... May 15 18:02:28.346377 systemd[1]: Starting motdgen.service... May 15 18:02:28.349337 systemd[1]: Starting ssh-key-proc-cmdline.service... May 15 18:02:28.351632 systemd[1]: Starting sshd-keygen.service... May 15 18:02:28.357728 systemd[1]: Starting systemd-logind.service... May 15 18:02:28.358260 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 18:02:28.372384 jq[1141]: false May 15 18:02:28.358310 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 15 18:02:28.358762 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 15 18:02:28.359360 systemd[1]: Starting update-engine.service... May 15 18:02:28.380751 jq[1149]: true May 15 18:02:28.360799 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 15 18:02:28.372415 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 15 18:02:28.372601 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 15 18:02:28.387369 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 15 18:02:28.387516 systemd[1]: Finished ssh-key-proc-cmdline.service. May 15 18:02:28.417059 jq[1154]: true May 15 18:02:28.426913 extend-filesystems[1142]: Found loop1 May 15 18:02:28.427702 extend-filesystems[1142]: Found vda May 15 18:02:28.427702 extend-filesystems[1142]: Found vda1 May 15 18:02:28.427702 extend-filesystems[1142]: Found vda2 May 15 18:02:28.427702 extend-filesystems[1142]: Found vda3 May 15 18:02:28.427702 extend-filesystems[1142]: Found usr May 15 18:02:28.427702 extend-filesystems[1142]: Found vda4 May 15 18:02:28.427702 extend-filesystems[1142]: Found vda6 May 15 18:02:28.427702 extend-filesystems[1142]: Found vda7 May 15 18:02:28.427702 extend-filesystems[1142]: Found vda9 May 15 18:02:28.427702 extend-filesystems[1142]: Checking size of /dev/vda9 May 15 18:02:28.455186 systemd[1]: motdgen.service: Deactivated successfully. May 15 18:02:28.455372 systemd[1]: Finished motdgen.service. May 15 18:02:28.460777 dbus-daemon[1138]: [system] SELinux support is enabled May 15 18:02:28.460947 systemd[1]: Started dbus.service. May 15 18:02:28.463689 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 15 18:02:28.463719 systemd[1]: Reached target system-config.target. May 15 18:02:28.464252 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 15 18:02:28.464268 systemd[1]: Reached target user-config.target. May 15 18:02:28.467283 extend-filesystems[1142]: Resized partition /dev/vda9 May 15 18:02:28.482421 systemd[1]: Created slice system-sshd.slice. May 15 18:02:28.490385 extend-filesystems[1174]: resize2fs 1.46.5 (30-Dec-2021) May 15 18:02:28.504225 systemd-timesyncd[1117]: Contacted time server 45.61.187.39:123 (0.flatcar.pool.ntp.org). May 15 18:02:28.505005 systemd-timesyncd[1117]: Initial clock synchronization to Thu 2025-05-15 18:02:28.502908 UTC. May 15 18:02:28.508926 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 2014203 blocks May 15 18:02:28.518565 kernel: EXT4-fs (vda9): resized filesystem to 2014203 May 15 18:02:28.540462 update_engine[1148]: I0515 18:02:28.537115 1148 main.cc:92] Flatcar Update Engine starting May 15 18:02:28.550907 systemd[1]: Started update-engine.service. May 15 18:02:28.577124 update_engine[1148]: I0515 18:02:28.550933 1148 update_check_scheduler.cc:74] Next update check in 2m42s May 15 18:02:28.553645 systemd[1]: Started locksmithd.service. May 15 18:02:28.577762 systemd-logind[1147]: Watching system buttons on /dev/input/event1 (Power Button) May 15 18:02:28.579972 env[1157]: time="2025-05-15T18:02:28.577797566Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 15 18:02:28.580671 extend-filesystems[1174]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 15 18:02:28.580671 extend-filesystems[1174]: old_desc_blocks = 1, new_desc_blocks = 1 May 15 18:02:28.580671 extend-filesystems[1174]: The filesystem on /dev/vda9 is now 2014203 (4k) blocks long. May 15 18:02:28.577793 systemd-logind[1147]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 15 18:02:28.588850 extend-filesystems[1142]: Resized filesystem in /dev/vda9 May 15 18:02:28.578337 systemd-logind[1147]: New seat seat0. May 15 18:02:28.582179 systemd[1]: extend-filesystems.service: Deactivated successfully. May 15 18:02:28.582612 systemd[1]: Finished extend-filesystems.service. May 15 18:02:28.588062 systemd[1]: Started systemd-logind.service. May 15 18:02:28.595034 bash[1188]: Updated "/home/core/.ssh/authorized_keys" May 15 18:02:28.595439 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 15 18:02:28.624513 env[1157]: time="2025-05-15T18:02:28.624446776Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 15 18:02:28.624685 env[1157]: time="2025-05-15T18:02:28.624658784Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 15 18:02:28.628633 env[1157]: time="2025-05-15T18:02:28.628591400Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 15 18:02:28.628633 env[1157]: time="2025-05-15T18:02:28.628630383Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 15 18:02:28.628882 env[1157]: time="2025-05-15T18:02:28.628855014Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 18:02:28.628921 env[1157]: time="2025-05-15T18:02:28.628880842Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 15 18:02:28.628921 env[1157]: time="2025-05-15T18:02:28.628896522Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 15 18:02:28.628921 env[1157]: time="2025-05-15T18:02:28.628908394Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 15 18:02:28.629010 env[1157]: time="2025-05-15T18:02:28.628985659Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 15 18:02:28.630353 env[1157]: time="2025-05-15T18:02:28.630327536Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 15 18:02:28.630503 env[1157]: time="2025-05-15T18:02:28.630474221Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 18:02:28.630503 env[1157]: time="2025-05-15T18:02:28.630499238Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 15 18:02:28.630618 env[1157]: time="2025-05-15T18:02:28.630592833Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 15 18:02:28.630667 env[1157]: time="2025-05-15T18:02:28.630615426Z" level=info msg="metadata content store policy set" policy=shared May 15 18:02:28.647657 env[1157]: time="2025-05-15T18:02:28.647614628Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 15 18:02:28.647704 env[1157]: time="2025-05-15T18:02:28.647664702Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 15 18:02:28.647704 env[1157]: time="2025-05-15T18:02:28.647684699Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 15 18:02:28.647769 env[1157]: time="2025-05-15T18:02:28.647724714Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 15 18:02:28.647769 env[1157]: time="2025-05-15T18:02:28.647744441Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 15 18:02:28.647769 env[1157]: time="2025-05-15T18:02:28.647762485Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 15 18:02:28.647842 env[1157]: time="2025-05-15T18:02:28.647779507Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 15 18:02:28.647842 env[1157]: time="2025-05-15T18:02:28.647797481Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 15 18:02:28.647842 env[1157]: time="2025-05-15T18:02:28.647814833Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 15 18:02:28.647842 env[1157]: time="2025-05-15T18:02:28.647832606Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 15 18:02:28.647934 env[1157]: time="2025-05-15T18:02:28.647848396Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 15 18:02:28.647934 env[1157]: time="2025-05-15T18:02:28.647865809Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 15 18:02:28.648030 env[1157]: time="2025-05-15T18:02:28.648003948Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 15 18:02:28.648131 env[1157]: time="2025-05-15T18:02:28.648105378Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 15 18:02:28.648698 env[1157]: time="2025-05-15T18:02:28.648412464Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 15 18:02:28.650123 env[1157]: time="2025-05-15T18:02:28.650098186Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 15 18:02:28.650170 env[1157]: time="2025-05-15T18:02:28.650126018Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 15 18:02:28.650266 env[1157]: time="2025-05-15T18:02:28.650243198Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 15 18:02:28.650316 env[1157]: time="2025-05-15T18:02:28.650268575Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 15 18:02:28.650316 env[1157]: time="2025-05-15T18:02:28.650286399Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 15 18:02:28.650371 env[1157]: time="2025-05-15T18:02:28.650301066Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 15 18:02:28.650371 env[1157]: time="2025-05-15T18:02:28.650337815Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 15 18:02:28.650371 env[1157]: time="2025-05-15T18:02:28.650355238Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 15 18:02:28.650371 env[1157]: time="2025-05-15T18:02:28.650370396Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 15 18:02:28.650763 env[1157]: time="2025-05-15T18:02:28.650741051Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 15 18:02:28.650849 env[1157]: time="2025-05-15T18:02:28.650768964Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 15 18:02:28.652233 env[1157]: time="2025-05-15T18:02:28.652206610Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 15 18:02:28.652272 env[1157]: time="2025-05-15T18:02:28.652236256Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 15 18:02:28.652272 env[1157]: time="2025-05-15T18:02:28.652253638Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 15 18:02:28.652318 env[1157]: time="2025-05-15T18:02:28.652267995Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 15 18:02:28.652318 env[1157]: time="2025-05-15T18:02:28.652305676Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 15 18:02:28.652375 env[1157]: time="2025-05-15T18:02:28.652319752Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 15 18:02:28.652375 env[1157]: time="2025-05-15T18:02:28.652341172Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 15 18:02:28.652492 env[1157]: time="2025-05-15T18:02:28.652470705Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 15 18:02:28.652839 env[1157]: time="2025-05-15T18:02:28.652756581Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 15 18:02:28.657285 env[1157]: time="2025-05-15T18:02:28.652851139Z" level=info msg="Connect containerd service" May 15 18:02:28.657285 env[1157]: time="2025-05-15T18:02:28.652929275Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 15 18:02:28.657285 env[1157]: time="2025-05-15T18:02:28.655205194Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 18:02:28.657285 env[1157]: time="2025-05-15T18:02:28.655397975Z" level=info msg="Start subscribing containerd event" May 15 18:02:28.657285 env[1157]: time="2025-05-15T18:02:28.655489327Z" level=info msg="Start recovering state" May 15 18:02:28.657285 env[1157]: time="2025-05-15T18:02:28.655497783Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 15 18:02:28.657285 env[1157]: time="2025-05-15T18:02:28.655581790Z" level=info msg=serving... address=/run/containerd/containerd.sock May 15 18:02:28.657285 env[1157]: time="2025-05-15T18:02:28.655642294Z" level=info msg="containerd successfully booted in 0.104508s" May 15 18:02:28.655765 systemd[1]: Started containerd.service. May 15 18:02:28.659655 env[1157]: time="2025-05-15T18:02:28.659627388Z" level=info msg="Start event monitor" May 15 18:02:28.661993 env[1157]: time="2025-05-15T18:02:28.661939995Z" level=info msg="Start snapshots syncer" May 15 18:02:28.662047 env[1157]: time="2025-05-15T18:02:28.661995549Z" level=info msg="Start cni network conf syncer for default" May 15 18:02:28.662047 env[1157]: time="2025-05-15T18:02:28.662018442Z" level=info msg="Start streaming server" May 15 18:02:28.820887 locksmithd[1195]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 15 18:02:29.887734 sshd_keygen[1166]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 15 18:02:29.912425 systemd[1]: Finished sshd-keygen.service. May 15 18:02:29.914519 systemd[1]: Starting issuegen.service... May 15 18:02:29.915996 systemd[1]: Started sshd@0-172.24.4.194:22-172.24.4.1:53022.service. May 15 18:02:29.924852 systemd[1]: issuegen.service: Deactivated successfully. May 15 18:02:29.925014 systemd[1]: Finished issuegen.service. May 15 18:02:29.927581 systemd[1]: Starting systemd-user-sessions.service... May 15 18:02:29.936815 systemd[1]: Finished systemd-user-sessions.service. May 15 18:02:29.938815 systemd[1]: Started getty@tty1.service. May 15 18:02:29.941960 systemd[1]: Started serial-getty@ttyS0.service. May 15 18:02:29.942656 systemd[1]: Reached target getty.target. May 15 18:02:30.354937 systemd[1]: Started kubelet.service. May 15 18:02:30.839634 sshd[1216]: Accepted publickey for core from 172.24.4.1 port 53022 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:02:30.914188 sshd[1216]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:02:31.022505 systemd-logind[1147]: New session 1 of user core. May 15 18:02:31.027873 systemd[1]: Created slice user-500.slice. May 15 18:02:31.031587 systemd[1]: Starting user-runtime-dir@500.service... May 15 18:02:31.058326 systemd[1]: Finished user-runtime-dir@500.service. May 15 18:02:31.064130 systemd[1]: Starting user@500.service... May 15 18:02:31.076121 (systemd)[1232]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 15 18:02:31.194793 systemd[1232]: Queued start job for default target default.target. May 15 18:02:31.195377 systemd[1232]: Reached target paths.target. May 15 18:02:31.195397 systemd[1232]: Reached target sockets.target. May 15 18:02:31.195413 systemd[1232]: Reached target timers.target. May 15 18:02:31.195441 systemd[1232]: Reached target basic.target. May 15 18:02:31.195485 systemd[1232]: Reached target default.target. May 15 18:02:31.195512 systemd[1232]: Startup finished in 104ms. May 15 18:02:31.195929 systemd[1]: Started user@500.service. May 15 18:02:31.199449 systemd[1]: Started session-1.scope. May 15 18:02:31.685059 systemd[1]: Started sshd@1-172.24.4.194:22-172.24.4.1:53032.service. May 15 18:02:32.114474 kubelet[1225]: E0515 18:02:32.114220 1225 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 18:02:32.118767 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 18:02:32.119082 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 18:02:32.119637 systemd[1]: kubelet.service: Consumed 2.077s CPU time. May 15 18:02:33.372950 sshd[1242]: Accepted publickey for core from 172.24.4.1 port 53032 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:02:33.375659 sshd[1242]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:02:33.385658 systemd-logind[1147]: New session 2 of user core. May 15 18:02:33.387218 systemd[1]: Started session-2.scope. May 15 18:02:34.015800 sshd[1242]: pam_unix(sshd:session): session closed for user core May 15 18:02:34.022523 systemd[1]: Started sshd@2-172.24.4.194:22-172.24.4.1:34988.service. May 15 18:02:34.027067 systemd[1]: sshd@1-172.24.4.194:22-172.24.4.1:53032.service: Deactivated successfully. May 15 18:02:34.028718 systemd[1]: session-2.scope: Deactivated successfully. May 15 18:02:34.034235 systemd-logind[1147]: Session 2 logged out. Waiting for processes to exit. May 15 18:02:34.036729 systemd-logind[1147]: Removed session 2. May 15 18:02:35.189073 sshd[1247]: Accepted publickey for core from 172.24.4.1 port 34988 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:02:35.192442 sshd[1247]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:02:35.203208 systemd-logind[1147]: New session 3 of user core. May 15 18:02:35.203946 systemd[1]: Started session-3.scope. May 15 18:02:35.468632 coreos-metadata[1137]: May 15 18:02:35.467 WARN failed to locate config-drive, using the metadata service API instead May 15 18:02:35.557027 coreos-metadata[1137]: May 15 18:02:35.556 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 May 15 18:02:35.827917 coreos-metadata[1137]: May 15 18:02:35.827 INFO Fetch successful May 15 18:02:35.827917 coreos-metadata[1137]: May 15 18:02:35.827 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 May 15 18:02:35.841357 coreos-metadata[1137]: May 15 18:02:35.841 INFO Fetch successful May 15 18:02:35.847247 unknown[1137]: wrote ssh authorized keys file for user: core May 15 18:02:35.880110 update-ssh-keys[1254]: Updated "/home/core/.ssh/authorized_keys" May 15 18:02:35.881687 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 15 18:02:35.882601 systemd[1]: Reached target multi-user.target. May 15 18:02:35.885454 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 15 18:02:35.903499 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 15 18:02:35.903920 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 15 18:02:35.905934 sshd[1247]: pam_unix(sshd:session): session closed for user core May 15 18:02:35.908696 systemd[1]: Startup finished in 1.043s (kernel) + 6.998s (initrd) + 14.196s (userspace) = 22.239s. May 15 18:02:35.911343 systemd[1]: sshd@2-172.24.4.194:22-172.24.4.1:34988.service: Deactivated successfully. May 15 18:02:35.912897 systemd[1]: session-3.scope: Deactivated successfully. May 15 18:02:35.914365 systemd-logind[1147]: Session 3 logged out. Waiting for processes to exit. May 15 18:02:35.916481 systemd-logind[1147]: Removed session 3. May 15 18:02:42.370932 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 15 18:02:42.371387 systemd[1]: Stopped kubelet.service. May 15 18:02:42.371473 systemd[1]: kubelet.service: Consumed 2.077s CPU time. May 15 18:02:42.374324 systemd[1]: Starting kubelet.service... May 15 18:02:42.581627 systemd[1]: Started kubelet.service. May 15 18:02:42.692780 kubelet[1261]: E0515 18:02:42.692591 1261 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 18:02:42.700319 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 18:02:42.700677 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 18:02:45.916141 systemd[1]: Started sshd@3-172.24.4.194:22-172.24.4.1:46004.service. May 15 18:02:47.079525 sshd[1269]: Accepted publickey for core from 172.24.4.1 port 46004 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:02:47.083036 sshd[1269]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:02:47.093657 systemd-logind[1147]: New session 4 of user core. May 15 18:02:47.094358 systemd[1]: Started session-4.scope. May 15 18:02:47.719147 sshd[1269]: pam_unix(sshd:session): session closed for user core May 15 18:02:47.727417 systemd[1]: Started sshd@4-172.24.4.194:22-172.24.4.1:46010.service. May 15 18:02:47.730173 systemd[1]: sshd@3-172.24.4.194:22-172.24.4.1:46004.service: Deactivated successfully. May 15 18:02:47.731855 systemd[1]: session-4.scope: Deactivated successfully. May 15 18:02:47.735254 systemd-logind[1147]: Session 4 logged out. Waiting for processes to exit. May 15 18:02:47.737882 systemd-logind[1147]: Removed session 4. May 15 18:02:49.070659 sshd[1274]: Accepted publickey for core from 172.24.4.1 port 46010 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:02:49.073315 sshd[1274]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:02:49.083945 systemd-logind[1147]: New session 5 of user core. May 15 18:02:49.084685 systemd[1]: Started session-5.scope. May 15 18:02:49.711353 sshd[1274]: pam_unix(sshd:session): session closed for user core May 15 18:02:49.718350 systemd[1]: Started sshd@5-172.24.4.194:22-172.24.4.1:46024.service. May 15 18:02:49.722335 systemd[1]: sshd@4-172.24.4.194:22-172.24.4.1:46010.service: Deactivated successfully. May 15 18:02:49.723994 systemd[1]: session-5.scope: Deactivated successfully. May 15 18:02:49.726966 systemd-logind[1147]: Session 5 logged out. Waiting for processes to exit. May 15 18:02:49.729580 systemd-logind[1147]: Removed session 5. May 15 18:02:51.021973 sshd[1280]: Accepted publickey for core from 172.24.4.1 port 46024 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:02:51.025490 sshd[1280]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:02:51.036099 systemd-logind[1147]: New session 6 of user core. May 15 18:02:51.036793 systemd[1]: Started session-6.scope. May 15 18:02:51.663349 sshd[1280]: pam_unix(sshd:session): session closed for user core May 15 18:02:51.671808 systemd[1]: Started sshd@6-172.24.4.194:22-172.24.4.1:46028.service. May 15 18:02:51.673155 systemd[1]: sshd@5-172.24.4.194:22-172.24.4.1:46024.service: Deactivated successfully. May 15 18:02:51.674721 systemd[1]: session-6.scope: Deactivated successfully. May 15 18:02:51.679087 systemd-logind[1147]: Session 6 logged out. Waiting for processes to exit. May 15 18:02:51.682141 systemd-logind[1147]: Removed session 6. May 15 18:02:52.851086 sshd[1286]: Accepted publickey for core from 172.24.4.1 port 46028 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:02:52.854921 sshd[1286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:02:52.857117 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 15 18:02:52.857784 systemd[1]: Stopped kubelet.service. May 15 18:02:52.860767 systemd[1]: Starting kubelet.service... May 15 18:02:52.868271 systemd-logind[1147]: New session 7 of user core. May 15 18:02:52.873288 systemd[1]: Started session-7.scope. May 15 18:02:53.173848 systemd[1]: Started kubelet.service. May 15 18:02:53.367897 sudo[1300]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 15 18:02:53.368414 sudo[1300]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 18:02:53.379908 dbus-daemon[1138]: \xd0\xedi\xf6HV: received setenforce notice (enforcing=-2129215136) May 15 18:02:53.382332 kubelet[1294]: E0515 18:02:53.380618 1294 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 18:02:53.382981 sudo[1300]: pam_unix(sudo:session): session closed for user root May 15 18:02:53.388032 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 18:02:53.388324 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 18:02:53.539724 sshd[1286]: pam_unix(sshd:session): session closed for user core May 15 18:02:53.549233 systemd[1]: Started sshd@7-172.24.4.194:22-172.24.4.1:58006.service. May 15 18:02:53.552659 systemd[1]: sshd@6-172.24.4.194:22-172.24.4.1:46028.service: Deactivated successfully. May 15 18:02:53.554097 systemd[1]: session-7.scope: Deactivated successfully. May 15 18:02:53.556881 systemd-logind[1147]: Session 7 logged out. Waiting for processes to exit. May 15 18:02:53.559879 systemd-logind[1147]: Removed session 7. May 15 18:02:54.926076 sshd[1303]: Accepted publickey for core from 172.24.4.1 port 58006 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:02:54.928846 sshd[1303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:02:54.939737 systemd-logind[1147]: New session 8 of user core. May 15 18:02:54.940281 systemd[1]: Started session-8.scope. May 15 18:02:55.353520 sudo[1308]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 15 18:02:55.354799 sudo[1308]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 18:02:55.361228 sudo[1308]: pam_unix(sudo:session): session closed for user root May 15 18:02:55.372219 sudo[1307]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 15 18:02:55.373500 sudo[1307]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 18:02:55.395807 systemd[1]: Stopping audit-rules.service... May 15 18:02:55.396000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 18:02:55.398826 auditctl[1311]: No rules May 15 18:02:55.401323 kernel: kauditd_printk_skb: 192 callbacks suppressed May 15 18:02:55.401452 kernel: audit: type=1305 audit(1747332175.396:223): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 18:02:55.402079 systemd[1]: audit-rules.service: Deactivated successfully. May 15 18:02:55.402429 systemd[1]: Stopped audit-rules.service. May 15 18:02:55.396000 audit[1311]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc1548bbe0 a2=420 a3=0 items=0 ppid=1 pid=1311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:02:55.413732 systemd[1]: Starting audit-rules.service... May 15 18:02:55.428344 kernel: audit: type=1300 audit(1747332175.396:223): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc1548bbe0 a2=420 a3=0 items=0 ppid=1 pid=1311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:02:55.396000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 15 18:02:55.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:55.448081 kernel: audit: type=1327 audit(1747332175.396:223): proctitle=2F7362696E2F617564697463746C002D44 May 15 18:02:55.448208 kernel: audit: type=1131 audit(1747332175.401:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:55.468338 augenrules[1328]: No rules May 15 18:02:55.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:55.469829 systemd[1]: Finished audit-rules.service. May 15 18:02:55.471519 sudo[1307]: pam_unix(sudo:session): session closed for user root May 15 18:02:55.471000 audit[1307]: USER_END pid=1307 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 18:02:55.492674 kernel: audit: type=1130 audit(1747332175.469:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:55.492809 kernel: audit: type=1106 audit(1747332175.471:226): pid=1307 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 18:02:55.492870 kernel: audit: type=1104 audit(1747332175.471:227): pid=1307 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 18:02:55.471000 audit[1307]: CRED_DISP pid=1307 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 18:02:55.796732 sshd[1303]: pam_unix(sshd:session): session closed for user core May 15 18:02:55.802000 audit[1303]: USER_END pid=1303 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:02:55.803450 systemd[1]: Started sshd@8-172.24.4.194:22-172.24.4.1:58014.service. May 15 18:02:55.812022 systemd[1]: sshd@7-172.24.4.194:22-172.24.4.1:58006.service: Deactivated successfully. May 15 18:02:55.813730 systemd[1]: session-8.scope: Deactivated successfully. May 15 18:02:55.823624 kernel: audit: type=1106 audit(1747332175.802:228): pid=1303 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:02:55.802000 audit[1303]: CRED_DISP pid=1303 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:02:55.841505 systemd-logind[1147]: Session 8 logged out. Waiting for processes to exit. May 15 18:02:55.841778 kernel: audit: type=1104 audit(1747332175.802:229): pid=1303 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:02:55.841853 kernel: audit: type=1130 audit(1747332175.810:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.194:22-172.24.4.1:58014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:55.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.194:22-172.24.4.1:58014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:55.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.194:22-172.24.4.1:58006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:02:55.857820 systemd-logind[1147]: Removed session 8. May 15 18:02:57.130000 audit[1333]: USER_ACCT pid=1333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:02:57.131842 sshd[1333]: Accepted publickey for core from 172.24.4.1 port 58014 ssh2: RSA SHA256:lz85KEoa9OSNE4yBofg0wzTI7RsZJD6xBqTw2Doc0+0 May 15 18:02:57.133000 audit[1333]: CRED_ACQ pid=1333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:02:57.133000 audit[1333]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbd96ec70 a2=3 a3=0 items=0 ppid=1 pid=1333 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:02:57.133000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 18:02:57.134674 sshd[1333]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 18:02:57.145807 systemd-logind[1147]: New session 9 of user core. May 15 18:02:57.146931 systemd[1]: Started session-9.scope. May 15 18:02:57.159000 audit[1333]: USER_START pid=1333 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:02:57.162000 audit[1336]: CRED_ACQ pid=1336 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:02:57.523000 audit[1337]: USER_ACCT pid=1337 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 18:02:57.523000 audit[1337]: CRED_REFR pid=1337 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 18:02:57.524131 sudo[1337]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 15 18:02:57.524680 sudo[1337]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 18:02:57.528000 audit[1337]: USER_START pid=1337 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 18:02:57.556312 systemd[1]: Starting coreos-metadata.service... May 15 18:03:03.640218 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 15 18:03:03.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:03.641072 systemd[1]: Stopped kubelet.service. May 15 18:03:03.652578 kernel: kauditd_printk_skb: 11 callbacks suppressed May 15 18:03:03.652772 kernel: audit: type=1130 audit(1747332183.640:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:03.646397 systemd[1]: Starting kubelet.service... May 15 18:03:03.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:03.674527 kernel: audit: type=1131 audit(1747332183.640:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:03.934336 systemd[1]: Started kubelet.service. May 15 18:03:03.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:03.940593 kernel: audit: type=1130 audit(1747332183.934:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:04.124661 kubelet[1350]: E0515 18:03:04.124531 1350 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 18:03:04.128975 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 18:03:04.129387 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 18:03:04.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 18:03:04.143621 kernel: audit: type=1131 audit(1747332184.129:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 18:03:04.623899 coreos-metadata[1341]: May 15 18:03:04.623 WARN failed to locate config-drive, using the metadata service API instead May 15 18:03:04.716657 coreos-metadata[1341]: May 15 18:03:04.716 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 May 15 18:03:05.038406 coreos-metadata[1341]: May 15 18:03:05.038 INFO Fetch successful May 15 18:03:05.038406 coreos-metadata[1341]: May 15 18:03:05.038 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 May 15 18:03:05.052269 coreos-metadata[1341]: May 15 18:03:05.052 INFO Fetch successful May 15 18:03:05.052269 coreos-metadata[1341]: May 15 18:03:05.052 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 May 15 18:03:05.063485 coreos-metadata[1341]: May 15 18:03:05.063 INFO Fetch successful May 15 18:03:05.063485 coreos-metadata[1341]: May 15 18:03:05.063 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 May 15 18:03:05.076927 coreos-metadata[1341]: May 15 18:03:05.076 INFO Fetch successful May 15 18:03:05.077175 coreos-metadata[1341]: May 15 18:03:05.076 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 May 15 18:03:05.087272 coreos-metadata[1341]: May 15 18:03:05.087 INFO Fetch successful May 15 18:03:05.104254 systemd[1]: Finished coreos-metadata.service. May 15 18:03:05.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:05.123722 kernel: audit: type=1130 audit(1747332185.105:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:07.001042 systemd[1]: Stopped kubelet.service. May 15 18:03:07.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:07.015705 kernel: audit: type=1130 audit(1747332187.001:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:07.011335 systemd[1]: Starting kubelet.service... May 15 18:03:07.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:07.030601 kernel: audit: type=1131 audit(1747332187.001:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:07.050921 systemd[1]: Reloading. May 15 18:03:07.155038 /usr/lib/systemd/system-generators/torcx-generator[1411]: time="2025-05-15T18:03:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 18:03:07.155071 /usr/lib/systemd/system-generators/torcx-generator[1411]: time="2025-05-15T18:03:07Z" level=info msg="torcx already run" May 15 18:03:07.293433 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 18:03:07.293739 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 18:03:07.328245 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 18:03:07.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.421574 kernel: audit: type=1400 audit(1747332187.411:247): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.421655 kernel: audit: type=1400 audit(1747332187.411:248): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.421000 audit: BPF prog-id=46 op=LOAD May 15 18:03:07.421000 audit: BPF prog-id=39 op=UNLOAD May 15 18:03:07.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.436589 kernel: audit: type=1400 audit(1747332187.421:249): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.435000 audit: BPF prog-id=47 op=LOAD May 15 18:03:07.435000 audit: BPF prog-id=30 op=UNLOAD May 15 18:03:07.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.436000 audit: BPF prog-id=48 op=LOAD May 15 18:03:07.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.437000 audit: BPF prog-id=49 op=LOAD May 15 18:03:07.437000 audit: BPF prog-id=31 op=UNLOAD May 15 18:03:07.437000 audit: BPF prog-id=32 op=UNLOAD May 15 18:03:07.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.438000 audit: BPF prog-id=50 op=LOAD May 15 18:03:07.438000 audit: BPF prog-id=33 op=UNLOAD May 15 18:03:07.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.439000 audit: BPF prog-id=51 op=LOAD May 15 18:03:07.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.440000 audit: BPF prog-id=52 op=LOAD May 15 18:03:07.440000 audit: BPF prog-id=34 op=UNLOAD May 15 18:03:07.440000 audit: BPF prog-id=35 op=UNLOAD May 15 18:03:07.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.443000 audit: BPF prog-id=53 op=LOAD May 15 18:03:07.443000 audit: BPF prog-id=40 op=UNLOAD May 15 18:03:07.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.445000 audit: BPF prog-id=54 op=LOAD May 15 18:03:07.445000 audit: BPF prog-id=41 op=UNLOAD May 15 18:03:07.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.446000 audit: BPF prog-id=55 op=LOAD May 15 18:03:07.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.446000 audit: BPF prog-id=56 op=LOAD May 15 18:03:07.446000 audit: BPF prog-id=42 op=UNLOAD May 15 18:03:07.447000 audit: BPF prog-id=43 op=UNLOAD May 15 18:03:07.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.449000 audit: BPF prog-id=57 op=LOAD May 15 18:03:07.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.450000 audit: BPF prog-id=58 op=LOAD May 15 18:03:07.450000 audit: BPF prog-id=36 op=UNLOAD May 15 18:03:07.450000 audit: BPF prog-id=37 op=UNLOAD May 15 18:03:07.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.452000 audit: BPF prog-id=59 op=LOAD May 15 18:03:07.452000 audit: BPF prog-id=38 op=UNLOAD May 15 18:03:07.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:07.454000 audit: BPF prog-id=60 op=LOAD May 15 18:03:07.454000 audit: BPF prog-id=44 op=UNLOAD May 15 18:03:07.484422 systemd[1]: Started kubelet.service. May 15 18:03:07.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:07.487060 systemd[1]: Stopping kubelet.service... May 15 18:03:07.487892 systemd[1]: kubelet.service: Deactivated successfully. May 15 18:03:07.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:07.488067 systemd[1]: Stopped kubelet.service. May 15 18:03:07.489746 systemd[1]: Starting kubelet.service... May 15 18:03:07.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:07.612272 systemd[1]: Started kubelet.service. May 15 18:03:07.683525 kubelet[1465]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 18:03:07.684141 kubelet[1465]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 18:03:07.684240 kubelet[1465]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 18:03:07.893244 kubelet[1465]: I0515 18:03:07.892812 1465 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 18:03:08.303151 kubelet[1465]: I0515 18:03:08.302947 1465 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 15 18:03:08.303418 kubelet[1465]: I0515 18:03:08.303399 1465 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 18:03:08.303986 kubelet[1465]: I0515 18:03:08.303958 1465 server.go:927] "Client rotation is on, will bootstrap in background" May 15 18:03:08.391927 kubelet[1465]: I0515 18:03:08.391848 1465 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 18:03:08.463829 kubelet[1465]: I0515 18:03:08.463696 1465 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 18:03:08.466231 kubelet[1465]: I0515 18:03:08.466065 1465 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 18:03:08.468304 kubelet[1465]: I0515 18:03:08.466832 1465 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.24.4.194","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 15 18:03:08.469337 kubelet[1465]: I0515 18:03:08.469185 1465 topology_manager.go:138] "Creating topology manager with none policy" May 15 18:03:08.469855 kubelet[1465]: I0515 18:03:08.469745 1465 container_manager_linux.go:301] "Creating device plugin manager" May 15 18:03:08.471358 kubelet[1465]: I0515 18:03:08.471225 1465 state_mem.go:36] "Initialized new in-memory state store" May 15 18:03:08.477694 kubelet[1465]: I0515 18:03:08.477451 1465 kubelet.go:400] "Attempting to sync node with API server" May 15 18:03:08.478660 kubelet[1465]: I0515 18:03:08.478466 1465 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 18:03:08.479394 kubelet[1465]: I0515 18:03:08.479301 1465 kubelet.go:312] "Adding apiserver pod source" May 15 18:03:08.481040 kubelet[1465]: I0515 18:03:08.480997 1465 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 18:03:08.481357 kubelet[1465]: E0515 18:03:08.481266 1465 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:08.481357 kubelet[1465]: E0515 18:03:08.481161 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:08.493013 kubelet[1465]: I0515 18:03:08.492964 1465 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 18:03:08.498358 kubelet[1465]: I0515 18:03:08.498295 1465 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 18:03:08.499024 kubelet[1465]: W0515 18:03:08.498957 1465 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 15 18:03:08.501959 kubelet[1465]: I0515 18:03:08.501919 1465 server.go:1264] "Started kubelet" May 15 18:03:08.510653 kubelet[1465]: I0515 18:03:08.509140 1465 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 18:03:08.512689 kubelet[1465]: I0515 18:03:08.512621 1465 server.go:455] "Adding debug handlers to kubelet server" May 15 18:03:08.519497 kubelet[1465]: I0515 18:03:08.519387 1465 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 18:03:08.527754 kubelet[1465]: I0515 18:03:08.527648 1465 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 18:03:08.529000 audit[1465]: AVC avc: denied { mac_admin } for pid=1465 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:08.529000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 18:03:08.529000 audit[1465]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b58ff0 a1=c00073d398 a2=c000b58fc0 a3=25 items=0 ppid=1 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:08.529000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 18:03:08.531266 kubelet[1465]: I0515 18:03:08.531198 1465 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 18:03:08.530000 audit[1465]: AVC avc: denied { mac_admin } for pid=1465 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:08.530000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 18:03:08.530000 audit[1465]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b3a980 a1=c00073d3b0 a2=c000b59080 a3=25 items=0 ppid=1 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:08.530000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 18:03:08.531792 kubelet[1465]: I0515 18:03:08.531760 1465 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 18:03:08.532029 kubelet[1465]: I0515 18:03:08.532009 1465 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 18:03:08.546109 kubelet[1465]: E0515 18:03:08.546062 1465 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 18:03:08.550829 kubelet[1465]: I0515 18:03:08.550797 1465 volume_manager.go:291] "Starting Kubelet Volume Manager" May 15 18:03:08.551742 kubelet[1465]: I0515 18:03:08.551727 1465 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 18:03:08.552016 kubelet[1465]: I0515 18:03:08.551967 1465 reconciler.go:26] "Reconciler: start to sync state" May 15 18:03:08.557065 kubelet[1465]: I0515 18:03:08.556974 1465 factory.go:221] Registration of the containerd container factory successfully May 15 18:03:08.557065 kubelet[1465]: I0515 18:03:08.556995 1465 factory.go:221] Registration of the systemd container factory successfully May 15 18:03:08.559786 kubelet[1465]: I0515 18:03:08.559725 1465 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 18:03:08.567940 kubelet[1465]: E0515 18:03:08.567505 1465 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.24.4.194\" not found" node="172.24.4.194" May 15 18:03:08.578323 kubelet[1465]: I0515 18:03:08.578263 1465 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 18:03:08.578323 kubelet[1465]: I0515 18:03:08.578305 1465 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 18:03:08.578712 kubelet[1465]: I0515 18:03:08.578347 1465 state_mem.go:36] "Initialized new in-memory state store" May 15 18:03:08.589793 kubelet[1465]: I0515 18:03:08.589752 1465 policy_none.go:49] "None policy: Start" May 15 18:03:08.592116 kubelet[1465]: I0515 18:03:08.592058 1465 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 18:03:08.592196 kubelet[1465]: I0515 18:03:08.592139 1465 state_mem.go:35] "Initializing new in-memory state store" May 15 18:03:08.611157 systemd[1]: Created slice kubepods.slice. May 15 18:03:08.617739 systemd[1]: Created slice kubepods-burstable.slice. May 15 18:03:08.635120 systemd[1]: Created slice kubepods-besteffort.slice. May 15 18:03:08.638000 audit[1481]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1481 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:08.638000 audit[1481]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc42107e80 a2=0 a3=7ffc42107e6c items=0 ppid=1465 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:08.638000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 18:03:08.645000 audit[1483]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:08.647482 kernel: kauditd_printk_skb: 183 callbacks suppressed May 15 18:03:08.647605 kernel: audit: type=1325 audit(1747332188.645:425): table=filter:3 family=2 entries=2 op=nft_register_chain pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:08.645000 audit[1483]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc52dd0e10 a2=0 a3=7ffc52dd0dfc items=0 ppid=1465 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:08.653044 kubelet[1465]: I0515 18:03:08.653020 1465 kubelet_node_status.go:73] "Attempting to register node" node="172.24.4.194" May 15 18:03:08.658136 kernel: audit: type=1300 audit(1747332188.645:425): arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc52dd0e10 a2=0 a3=7ffc52dd0dfc items=0 ppid=1465 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:08.645000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 18:03:08.663591 kernel: audit: type=1327 audit(1747332188.645:425): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 18:03:08.666326 kubelet[1465]: I0515 18:03:08.666286 1465 kubelet_node_status.go:76] "Successfully registered node" node="172.24.4.194" May 15 18:03:08.667148 kubelet[1465]: I0515 18:03:08.667123 1465 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 18:03:08.666000 audit[1465]: AVC avc: denied { mac_admin } for pid=1465 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:08.667475 kubelet[1465]: I0515 18:03:08.667448 1465 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 18:03:08.667829 kubelet[1465]: I0515 18:03:08.667756 1465 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 18:03:08.668148 kubelet[1465]: I0515 18:03:08.668099 1465 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 18:03:08.675048 kernel: audit: type=1400 audit(1747332188.666:426): avc: denied { mac_admin } for pid=1465 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:08.666000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 18:03:08.666000 audit[1465]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b05ef0 a1=c000c21290 a2=c000b05ec0 a3=25 items=0 ppid=1 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:08.686759 kernel: audit: type=1401 audit(1747332188.666:426): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 18:03:08.686893 kernel: audit: type=1300 audit(1747332188.666:426): arch=c000003e syscall=188 success=no exit=-22 a0=c000b05ef0 a1=c000c21290 a2=c000b05ec0 a3=25 items=0 ppid=1 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:08.666000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 18:03:08.694592 kernel: audit: type=1327 audit(1747332188.666:426): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 18:03:08.662000 audit[1485]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:08.662000 audit[1485]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd4b574600 a2=0 a3=7ffd4b5745ec items=0 ppid=1465 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:08.716357 kernel: audit: type=1325 audit(1747332188.662:427): table=filter:4 family=2 entries=2 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:08.716490 kernel: audit: type=1300 audit(1747332188.662:427): arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd4b574600 a2=0 a3=7ffd4b5745ec items=0 ppid=1465 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:08.716555 kernel: audit: type=1327 audit(1747332188.662:427): proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 18:03:08.662000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 18:03:08.709000 audit[1490]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:08.709000 audit[1490]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd9a973480 a2=0 a3=7ffd9a97346c items=0 ppid=1465 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:08.709000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 18:03:08.733341 kubelet[1465]: I0515 18:03:08.733285 1465 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 15 18:03:08.734113 env[1157]: time="2025-05-15T18:03:08.733710561Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 15 18:03:08.734736 kubelet[1465]: I0515 18:03:08.734341 1465 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 15 18:03:08.810000 audit[1495]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1495 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:08.810000 audit[1495]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff67f1bd70 a2=0 a3=7fff67f1bd5c items=0 ppid=1465 pid=1495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:08.810000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 15 18:03:08.817054 kubelet[1465]: I0515 18:03:08.816964 1465 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 18:03:08.818000 audit[1497]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1497 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:08.818000 audit[1497]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeab690c80 a2=0 a3=7ffeab690c6c items=0 ppid=1465 pid=1497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:08.818000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 18:03:08.819000 audit[1496]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1496 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:08.819000 audit[1496]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff4eb490e0 a2=0 a3=7fff4eb490cc items=0 ppid=1465 pid=1496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:08.819000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 18:03:08.820842 kubelet[1465]: I0515 18:03:08.820797 1465 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 18:03:08.820956 kubelet[1465]: I0515 18:03:08.820930 1465 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 18:03:08.821019 kubelet[1465]: I0515 18:03:08.821001 1465 kubelet.go:2337] "Starting kubelet main sync loop" May 15 18:03:08.821181 kubelet[1465]: E0515 18:03:08.821126 1465 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 15 18:03:08.821000 audit[1498]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1498 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:08.821000 audit[1498]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc61f57ee0 a2=0 a3=7ffc61f57ecc items=0 ppid=1465 pid=1498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:08.821000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 18:03:08.823000 audit[1499]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1499 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:08.823000 audit[1499]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe54a92750 a2=0 a3=7ffe54a9273c items=0 ppid=1465 pid=1499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:08.823000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 18:03:08.824000 audit[1501]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1501 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:08.824000 audit[1501]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff5ab21ba0 a2=0 a3=7fff5ab21b8c items=0 ppid=1465 pid=1501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:08.824000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 18:03:08.826000 audit[1502]: NETFILTER_CFG table=filter:12 family=10 entries=2 op=nft_register_chain pid=1502 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:08.826000 audit[1502]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffe07e03b0 a2=0 a3=7fffe07e039c items=0 ppid=1465 pid=1502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:08.826000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 18:03:08.826000 audit[1500]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1500 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:08.826000 audit[1500]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc669ab5a0 a2=0 a3=7ffc669ab58c items=0 ppid=1465 pid=1500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:08.826000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 18:03:09.156719 sudo[1337]: pam_unix(sudo:session): session closed for user root May 15 18:03:09.157000 audit[1337]: USER_END pid=1337 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 18:03:09.157000 audit[1337]: CRED_DISP pid=1337 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 18:03:09.307218 kubelet[1465]: I0515 18:03:09.307138 1465 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 15 18:03:09.308155 kubelet[1465]: W0515 18:03:09.308051 1465 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 15 18:03:09.308382 kubelet[1465]: W0515 18:03:09.308335 1465 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 15 18:03:09.308382 kubelet[1465]: W0515 18:03:09.308055 1465 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 15 18:03:09.430092 sshd[1333]: pam_unix(sshd:session): session closed for user core May 15 18:03:09.432000 audit[1333]: USER_END pid=1333 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:09.432000 audit[1333]: CRED_DISP pid=1333 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 18:03:09.436086 systemd[1]: sshd@8-172.24.4.194:22-172.24.4.1:58014.service: Deactivated successfully. May 15 18:03:09.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.194:22-172.24.4.1:58014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 18:03:09.437920 systemd[1]: session-9.scope: Deactivated successfully. May 15 18:03:09.438213 systemd[1]: session-9.scope: Consumed 1.120s CPU time. May 15 18:03:09.439378 systemd-logind[1147]: Session 9 logged out. Waiting for processes to exit. May 15 18:03:09.441428 systemd-logind[1147]: Removed session 9. May 15 18:03:09.482526 kubelet[1465]: E0515 18:03:09.482454 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:09.482893 kubelet[1465]: I0515 18:03:09.482787 1465 apiserver.go:52] "Watching apiserver" May 15 18:03:09.492105 kubelet[1465]: I0515 18:03:09.492007 1465 topology_manager.go:215] "Topology Admit Handler" podUID="84ba81ff-563f-40d8-9756-9c6f15660009" podNamespace="calico-system" podName="calico-node-cpjp2" May 15 18:03:09.492514 kubelet[1465]: I0515 18:03:09.492432 1465 topology_manager.go:215] "Topology Admit Handler" podUID="c728858b-b0dc-4cc7-831f-32aa358609d7" podNamespace="calico-system" podName="csi-node-driver-rnqf2" May 15 18:03:09.492733 kubelet[1465]: I0515 18:03:09.492697 1465 topology_manager.go:215] "Topology Admit Handler" podUID="eca799c9-d9b7-4874-b1b7-b07d8ca0dd4e" podNamespace="kube-system" podName="kube-proxy-6vrmb" May 15 18:03:09.494128 kubelet[1465]: E0515 18:03:09.493994 1465 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rnqf2" podUID="c728858b-b0dc-4cc7-831f-32aa358609d7" May 15 18:03:09.509450 systemd[1]: Created slice kubepods-besteffort-podeca799c9_d9b7_4874_b1b7_b07d8ca0dd4e.slice. May 15 18:03:09.529127 systemd[1]: Created slice kubepods-besteffort-pod84ba81ff_563f_40d8_9756_9c6f15660009.slice. May 15 18:03:09.556903 kubelet[1465]: I0515 18:03:09.556834 1465 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 18:03:09.564572 kubelet[1465]: I0515 18:03:09.564460 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/c728858b-b0dc-4cc7-831f-32aa358609d7-kubelet-dir\") pod \"csi-node-driver-rnqf2\" (UID: \"c728858b-b0dc-4cc7-831f-32aa358609d7\") " pod="calico-system/csi-node-driver-rnqf2" May 15 18:03:09.564792 kubelet[1465]: I0515 18:03:09.564602 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/84ba81ff-563f-40d8-9756-9c6f15660009-tigera-ca-bundle\") pod \"calico-node-cpjp2\" (UID: \"84ba81ff-563f-40d8-9756-9c6f15660009\") " pod="calico-system/calico-node-cpjp2" May 15 18:03:09.564792 kubelet[1465]: I0515 18:03:09.564670 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/84ba81ff-563f-40d8-9756-9c6f15660009-var-run-calico\") pod \"calico-node-cpjp2\" (UID: \"84ba81ff-563f-40d8-9756-9c6f15660009\") " pod="calico-system/calico-node-cpjp2" May 15 18:03:09.564792 kubelet[1465]: I0515 18:03:09.564726 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/84ba81ff-563f-40d8-9756-9c6f15660009-cni-log-dir\") pod \"calico-node-cpjp2\" (UID: \"84ba81ff-563f-40d8-9756-9c6f15660009\") " pod="calico-system/calico-node-cpjp2" May 15 18:03:09.565062 kubelet[1465]: I0515 18:03:09.564820 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f2swq\" (UniqueName: \"kubernetes.io/projected/84ba81ff-563f-40d8-9756-9c6f15660009-kube-api-access-f2swq\") pod \"calico-node-cpjp2\" (UID: \"84ba81ff-563f-40d8-9756-9c6f15660009\") " pod="calico-system/calico-node-cpjp2" May 15 18:03:09.565062 kubelet[1465]: I0515 18:03:09.564902 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/84ba81ff-563f-40d8-9756-9c6f15660009-lib-modules\") pod \"calico-node-cpjp2\" (UID: \"84ba81ff-563f-40d8-9756-9c6f15660009\") " pod="calico-system/calico-node-cpjp2" May 15 18:03:09.565062 kubelet[1465]: I0515 18:03:09.564959 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/c728858b-b0dc-4cc7-831f-32aa358609d7-varrun\") pod \"csi-node-driver-rnqf2\" (UID: \"c728858b-b0dc-4cc7-831f-32aa358609d7\") " pod="calico-system/csi-node-driver-rnqf2" May 15 18:03:09.565062 kubelet[1465]: I0515 18:03:09.565007 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/eca799c9-d9b7-4874-b1b7-b07d8ca0dd4e-lib-modules\") pod \"kube-proxy-6vrmb\" (UID: \"eca799c9-d9b7-4874-b1b7-b07d8ca0dd4e\") " pod="kube-system/kube-proxy-6vrmb" May 15 18:03:09.565062 kubelet[1465]: I0515 18:03:09.565060 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lsvbc\" (UniqueName: \"kubernetes.io/projected/eca799c9-d9b7-4874-b1b7-b07d8ca0dd4e-kube-api-access-lsvbc\") pod \"kube-proxy-6vrmb\" (UID: \"eca799c9-d9b7-4874-b1b7-b07d8ca0dd4e\") " pod="kube-system/kube-proxy-6vrmb" May 15 18:03:09.565458 kubelet[1465]: I0515 18:03:09.565110 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/84ba81ff-563f-40d8-9756-9c6f15660009-flexvol-driver-host\") pod \"calico-node-cpjp2\" (UID: \"84ba81ff-563f-40d8-9756-9c6f15660009\") " pod="calico-system/calico-node-cpjp2" May 15 18:03:09.565458 kubelet[1465]: I0515 18:03:09.565146 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/c728858b-b0dc-4cc7-831f-32aa358609d7-socket-dir\") pod \"csi-node-driver-rnqf2\" (UID: \"c728858b-b0dc-4cc7-831f-32aa358609d7\") " pod="calico-system/csi-node-driver-rnqf2" May 15 18:03:09.565458 kubelet[1465]: I0515 18:03:09.565193 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/eca799c9-d9b7-4874-b1b7-b07d8ca0dd4e-kube-proxy\") pod \"kube-proxy-6vrmb\" (UID: \"eca799c9-d9b7-4874-b1b7-b07d8ca0dd4e\") " pod="kube-system/kube-proxy-6vrmb" May 15 18:03:09.565458 kubelet[1465]: I0515 18:03:09.565256 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/84ba81ff-563f-40d8-9756-9c6f15660009-xtables-lock\") pod \"calico-node-cpjp2\" (UID: \"84ba81ff-563f-40d8-9756-9c6f15660009\") " pod="calico-system/calico-node-cpjp2" May 15 18:03:09.565458 kubelet[1465]: I0515 18:03:09.565309 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/84ba81ff-563f-40d8-9756-9c6f15660009-var-lib-calico\") pod \"calico-node-cpjp2\" (UID: \"84ba81ff-563f-40d8-9756-9c6f15660009\") " pod="calico-system/calico-node-cpjp2" May 15 18:03:09.566350 kubelet[1465]: I0515 18:03:09.565356 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/84ba81ff-563f-40d8-9756-9c6f15660009-cni-bin-dir\") pod \"calico-node-cpjp2\" (UID: \"84ba81ff-563f-40d8-9756-9c6f15660009\") " pod="calico-system/calico-node-cpjp2" May 15 18:03:09.566350 kubelet[1465]: I0515 18:03:09.565390 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/84ba81ff-563f-40d8-9756-9c6f15660009-cni-net-dir\") pod \"calico-node-cpjp2\" (UID: \"84ba81ff-563f-40d8-9756-9c6f15660009\") " pod="calico-system/calico-node-cpjp2" May 15 18:03:09.566350 kubelet[1465]: I0515 18:03:09.565432 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/eca799c9-d9b7-4874-b1b7-b07d8ca0dd4e-xtables-lock\") pod \"kube-proxy-6vrmb\" (UID: \"eca799c9-d9b7-4874-b1b7-b07d8ca0dd4e\") " pod="kube-system/kube-proxy-6vrmb" May 15 18:03:09.566350 kubelet[1465]: I0515 18:03:09.565476 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/84ba81ff-563f-40d8-9756-9c6f15660009-policysync\") pod \"calico-node-cpjp2\" (UID: \"84ba81ff-563f-40d8-9756-9c6f15660009\") " pod="calico-system/calico-node-cpjp2" May 15 18:03:09.566350 kubelet[1465]: I0515 18:03:09.565517 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/84ba81ff-563f-40d8-9756-9c6f15660009-node-certs\") pod \"calico-node-cpjp2\" (UID: \"84ba81ff-563f-40d8-9756-9c6f15660009\") " pod="calico-system/calico-node-cpjp2" May 15 18:03:09.566803 kubelet[1465]: I0515 18:03:09.565613 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/c728858b-b0dc-4cc7-831f-32aa358609d7-registration-dir\") pod \"csi-node-driver-rnqf2\" (UID: \"c728858b-b0dc-4cc7-831f-32aa358609d7\") " pod="calico-system/csi-node-driver-rnqf2" May 15 18:03:09.566803 kubelet[1465]: I0515 18:03:09.565679 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wv487\" (UniqueName: \"kubernetes.io/projected/c728858b-b0dc-4cc7-831f-32aa358609d7-kube-api-access-wv487\") pod \"csi-node-driver-rnqf2\" (UID: \"c728858b-b0dc-4cc7-831f-32aa358609d7\") " pod="calico-system/csi-node-driver-rnqf2" May 15 18:03:09.671797 kubelet[1465]: E0515 18:03:09.671649 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.671797 kubelet[1465]: W0515 18:03:09.671743 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.673923 kubelet[1465]: E0515 18:03:09.671862 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.673923 kubelet[1465]: E0515 18:03:09.672520 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.673923 kubelet[1465]: W0515 18:03:09.672593 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.673923 kubelet[1465]: E0515 18:03:09.672628 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.676524 kubelet[1465]: E0515 18:03:09.675888 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.676524 kubelet[1465]: W0515 18:03:09.675930 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.676524 kubelet[1465]: E0515 18:03:09.675965 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.677405 kubelet[1465]: E0515 18:03:09.677290 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.677405 kubelet[1465]: W0515 18:03:09.677317 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.677405 kubelet[1465]: E0515 18:03:09.677357 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.678301 kubelet[1465]: E0515 18:03:09.677985 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.678301 kubelet[1465]: W0515 18:03:09.678015 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.678301 kubelet[1465]: E0515 18:03:09.678046 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.679004 kubelet[1465]: E0515 18:03:09.678728 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.679004 kubelet[1465]: W0515 18:03:09.678754 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.679004 kubelet[1465]: E0515 18:03:09.678785 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.679822 kubelet[1465]: E0515 18:03:09.679594 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.679822 kubelet[1465]: W0515 18:03:09.679625 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.679822 kubelet[1465]: E0515 18:03:09.679657 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.690788 kubelet[1465]: E0515 18:03:09.682871 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.690788 kubelet[1465]: W0515 18:03:09.682914 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.690788 kubelet[1465]: E0515 18:03:09.682952 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.690788 kubelet[1465]: E0515 18:03:09.683917 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.690788 kubelet[1465]: W0515 18:03:09.683948 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.690788 kubelet[1465]: E0515 18:03:09.683982 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.690788 kubelet[1465]: E0515 18:03:09.684647 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.690788 kubelet[1465]: W0515 18:03:09.684694 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.690788 kubelet[1465]: E0515 18:03:09.684740 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.690788 kubelet[1465]: E0515 18:03:09.685640 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.691894 kubelet[1465]: W0515 18:03:09.685683 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.691894 kubelet[1465]: E0515 18:03:09.685711 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.691894 kubelet[1465]: E0515 18:03:09.686218 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.691894 kubelet[1465]: W0515 18:03:09.686242 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.691894 kubelet[1465]: E0515 18:03:09.686266 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.691894 kubelet[1465]: E0515 18:03:09.689366 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.691894 kubelet[1465]: W0515 18:03:09.689395 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.691894 kubelet[1465]: E0515 18:03:09.689882 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.691894 kubelet[1465]: W0515 18:03:09.689932 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.691894 kubelet[1465]: E0515 18:03:09.690333 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.692735 kubelet[1465]: W0515 18:03:09.690374 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.692735 kubelet[1465]: E0515 18:03:09.690821 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.692735 kubelet[1465]: W0515 18:03:09.690860 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.692735 kubelet[1465]: E0515 18:03:09.691267 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.692735 kubelet[1465]: W0515 18:03:09.691288 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.692735 kubelet[1465]: E0515 18:03:09.691857 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.692735 kubelet[1465]: W0515 18:03:09.691887 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.692735 kubelet[1465]: E0515 18:03:09.692266 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.692735 kubelet[1465]: W0515 18:03:09.692287 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.692735 kubelet[1465]: E0515 18:03:09.692737 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.694244 kubelet[1465]: W0515 18:03:09.692769 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.694244 kubelet[1465]: E0515 18:03:09.693416 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.694244 kubelet[1465]: W0515 18:03:09.693462 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.694244 kubelet[1465]: E0515 18:03:09.694123 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.694244 kubelet[1465]: W0515 18:03:09.694144 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.702492 kubelet[1465]: E0515 18:03:09.694466 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.702492 kubelet[1465]: W0515 18:03:09.694484 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.702492 kubelet[1465]: E0515 18:03:09.694849 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.702492 kubelet[1465]: W0515 18:03:09.694869 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.702492 kubelet[1465]: E0515 18:03:09.695248 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.702492 kubelet[1465]: W0515 18:03:09.695267 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.702492 kubelet[1465]: E0515 18:03:09.695298 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.702492 kubelet[1465]: E0515 18:03:09.695683 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.702492 kubelet[1465]: W0515 18:03:09.695701 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.702492 kubelet[1465]: E0515 18:03:09.695719 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.702492 kubelet[1465]: E0515 18:03:09.696018 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.703511 kubelet[1465]: W0515 18:03:09.696036 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.703511 kubelet[1465]: E0515 18:03:09.696054 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.703511 kubelet[1465]: E0515 18:03:09.696456 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.703511 kubelet[1465]: W0515 18:03:09.696475 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.703511 kubelet[1465]: E0515 18:03:09.696494 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.703511 kubelet[1465]: E0515 18:03:09.696585 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.703511 kubelet[1465]: E0515 18:03:09.696655 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.703511 kubelet[1465]: E0515 18:03:09.697016 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.703511 kubelet[1465]: W0515 18:03:09.697036 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.703511 kubelet[1465]: E0515 18:03:09.697056 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.704217 kubelet[1465]: E0515 18:03:09.697352 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.704217 kubelet[1465]: W0515 18:03:09.697370 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.704217 kubelet[1465]: E0515 18:03:09.697390 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.704217 kubelet[1465]: E0515 18:03:09.697870 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.704217 kubelet[1465]: W0515 18:03:09.697889 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.704217 kubelet[1465]: E0515 18:03:09.697907 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.704217 kubelet[1465]: E0515 18:03:09.697939 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.704217 kubelet[1465]: E0515 18:03:09.698235 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.704217 kubelet[1465]: W0515 18:03:09.698253 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.704217 kubelet[1465]: E0515 18:03:09.698272 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.705039 kubelet[1465]: E0515 18:03:09.698702 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.705039 kubelet[1465]: W0515 18:03:09.698726 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.705039 kubelet[1465]: E0515 18:03:09.698754 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.705039 kubelet[1465]: E0515 18:03:09.699121 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.705039 kubelet[1465]: W0515 18:03:09.699140 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.705039 kubelet[1465]: E0515 18:03:09.699159 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.714103 kubelet[1465]: E0515 18:03:09.711743 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.714103 kubelet[1465]: E0515 18:03:09.712092 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.714103 kubelet[1465]: E0515 18:03:09.712301 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.714103 kubelet[1465]: E0515 18:03:09.712429 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.714103 kubelet[1465]: E0515 18:03:09.712511 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.714103 kubelet[1465]: E0515 18:03:09.712620 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.714103 kubelet[1465]: E0515 18:03:09.712717 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.714103 kubelet[1465]: E0515 18:03:09.712754 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.714103 kubelet[1465]: E0515 18:03:09.712854 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.719586 kubelet[1465]: E0515 18:03:09.719513 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.719802 kubelet[1465]: W0515 18:03:09.719768 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.719957 kubelet[1465]: E0515 18:03:09.719931 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.730635 kubelet[1465]: E0515 18:03:09.730600 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.730859 kubelet[1465]: W0515 18:03:09.730828 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.732208 kubelet[1465]: E0515 18:03:09.731004 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.734343 kubelet[1465]: E0515 18:03:09.732225 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.734343 kubelet[1465]: W0515 18:03:09.734314 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.735916 kubelet[1465]: E0515 18:03:09.734375 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.735998 kubelet[1465]: E0515 18:03:09.735933 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.735998 kubelet[1465]: W0515 18:03:09.735956 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.736266 kubelet[1465]: E0515 18:03:09.736141 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.736464 kubelet[1465]: E0515 18:03:09.736418 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.736464 kubelet[1465]: W0515 18:03:09.736446 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.736695 kubelet[1465]: E0515 18:03:09.736627 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.739039 kubelet[1465]: E0515 18:03:09.736922 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.739039 kubelet[1465]: W0515 18:03:09.736952 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.739039 kubelet[1465]: E0515 18:03:09.737115 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.739039 kubelet[1465]: E0515 18:03:09.737439 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.739039 kubelet[1465]: W0515 18:03:09.737448 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.739039 kubelet[1465]: E0515 18:03:09.737607 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.739039 kubelet[1465]: E0515 18:03:09.737711 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.739039 kubelet[1465]: W0515 18:03:09.737720 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.739039 kubelet[1465]: E0515 18:03:09.737797 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.739039 kubelet[1465]: E0515 18:03:09.737921 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.739747 kubelet[1465]: W0515 18:03:09.737930 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.739747 kubelet[1465]: E0515 18:03:09.738077 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.739747 kubelet[1465]: E0515 18:03:09.738204 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.739747 kubelet[1465]: W0515 18:03:09.738213 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.739747 kubelet[1465]: E0515 18:03:09.738286 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.739747 kubelet[1465]: E0515 18:03:09.738411 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.739747 kubelet[1465]: W0515 18:03:09.738420 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.739747 kubelet[1465]: E0515 18:03:09.738483 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.739747 kubelet[1465]: E0515 18:03:09.738762 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.739747 kubelet[1465]: W0515 18:03:09.738806 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.740756 kubelet[1465]: E0515 18:03:09.738899 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.740756 kubelet[1465]: E0515 18:03:09.739097 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.740756 kubelet[1465]: W0515 18:03:09.739107 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.740756 kubelet[1465]: E0515 18:03:09.739176 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.740756 kubelet[1465]: E0515 18:03:09.739281 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.740756 kubelet[1465]: W0515 18:03:09.739297 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.740756 kubelet[1465]: E0515 18:03:09.739394 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.740756 kubelet[1465]: E0515 18:03:09.739497 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.740756 kubelet[1465]: W0515 18:03:09.739506 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.740756 kubelet[1465]: E0515 18:03:09.739601 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.741508 kubelet[1465]: E0515 18:03:09.739988 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.741508 kubelet[1465]: W0515 18:03:09.740013 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.741508 kubelet[1465]: E0515 18:03:09.740102 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.741508 kubelet[1465]: E0515 18:03:09.740263 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.741508 kubelet[1465]: W0515 18:03:09.740287 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.741508 kubelet[1465]: E0515 18:03:09.740391 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.741508 kubelet[1465]: E0515 18:03:09.740494 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.741508 kubelet[1465]: W0515 18:03:09.740503 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.741508 kubelet[1465]: E0515 18:03:09.740616 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.741508 kubelet[1465]: E0515 18:03:09.740716 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.742504 kubelet[1465]: W0515 18:03:09.740724 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.742504 kubelet[1465]: E0515 18:03:09.740790 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.742504 kubelet[1465]: E0515 18:03:09.740930 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.742504 kubelet[1465]: W0515 18:03:09.740939 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.742504 kubelet[1465]: E0515 18:03:09.741007 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.742504 kubelet[1465]: E0515 18:03:09.741153 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.742504 kubelet[1465]: W0515 18:03:09.741162 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.742504 kubelet[1465]: E0515 18:03:09.741275 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.742504 kubelet[1465]: E0515 18:03:09.741387 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.742504 kubelet[1465]: W0515 18:03:09.741404 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.743610 kubelet[1465]: E0515 18:03:09.741512 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.743610 kubelet[1465]: E0515 18:03:09.741638 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.743610 kubelet[1465]: W0515 18:03:09.741652 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.743610 kubelet[1465]: E0515 18:03:09.741754 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.743610 kubelet[1465]: E0515 18:03:09.741879 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.743610 kubelet[1465]: W0515 18:03:09.741889 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.743610 kubelet[1465]: E0515 18:03:09.741986 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.743610 kubelet[1465]: E0515 18:03:09.742118 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.743610 kubelet[1465]: W0515 18:03:09.742130 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.743610 kubelet[1465]: E0515 18:03:09.742240 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.744714 kubelet[1465]: E0515 18:03:09.742373 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.744714 kubelet[1465]: W0515 18:03:09.742388 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.744714 kubelet[1465]: E0515 18:03:09.742518 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.744714 kubelet[1465]: E0515 18:03:09.742692 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.744714 kubelet[1465]: W0515 18:03:09.742706 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.744714 kubelet[1465]: E0515 18:03:09.742814 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.744714 kubelet[1465]: E0515 18:03:09.742946 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.744714 kubelet[1465]: W0515 18:03:09.742961 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.744714 kubelet[1465]: E0515 18:03:09.743060 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.744714 kubelet[1465]: E0515 18:03:09.743195 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.745747 kubelet[1465]: W0515 18:03:09.743205 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.745747 kubelet[1465]: E0515 18:03:09.743217 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.761887 kubelet[1465]: E0515 18:03:09.761825 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.761887 kubelet[1465]: W0515 18:03:09.761848 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.761887 kubelet[1465]: E0515 18:03:09.761880 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.770162 kubelet[1465]: E0515 18:03:09.770137 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.770344 kubelet[1465]: W0515 18:03:09.770326 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.770456 kubelet[1465]: E0515 18:03:09.770441 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.770857 kubelet[1465]: E0515 18:03:09.770843 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.770972 kubelet[1465]: W0515 18:03:09.770956 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.771065 kubelet[1465]: E0515 18:03:09.771051 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.771508 kubelet[1465]: E0515 18:03:09.771493 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.771627 kubelet[1465]: W0515 18:03:09.771611 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.771724 kubelet[1465]: E0515 18:03:09.771710 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.772100 kubelet[1465]: E0515 18:03:09.772087 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.772183 kubelet[1465]: W0515 18:03:09.772170 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.772264 kubelet[1465]: E0515 18:03:09.772251 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.772613 kubelet[1465]: E0515 18:03:09.772602 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.772714 kubelet[1465]: W0515 18:03:09.772700 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.772791 kubelet[1465]: E0515 18:03:09.772779 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.773175 kubelet[1465]: E0515 18:03:09.773161 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.773269 kubelet[1465]: W0515 18:03:09.773254 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.773364 kubelet[1465]: E0515 18:03:09.773350 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.773970 kubelet[1465]: E0515 18:03:09.773955 1465 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 18:03:09.774073 kubelet[1465]: W0515 18:03:09.774059 1465 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 18:03:09.774169 kubelet[1465]: E0515 18:03:09.774156 1465 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 18:03:09.842119 env[1157]: time="2025-05-15T18:03:09.841927186Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6vrmb,Uid:eca799c9-d9b7-4874-b1b7-b07d8ca0dd4e,Namespace:kube-system,Attempt:0,}" May 15 18:03:09.869596 env[1157]: time="2025-05-15T18:03:09.869433560Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-cpjp2,Uid:84ba81ff-563f-40d8-9756-9c6f15660009,Namespace:calico-system,Attempt:0,}" May 15 18:03:10.484158 kubelet[1465]: E0515 18:03:10.484071 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:10.829825 kubelet[1465]: E0515 18:03:10.828509 1465 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rnqf2" podUID="c728858b-b0dc-4cc7-831f-32aa358609d7" May 15 18:03:10.875038 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1784146466.mount: Deactivated successfully. May 15 18:03:11.085924 env[1157]: time="2025-05-15T18:03:11.085505352Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:11.089407 env[1157]: time="2025-05-15T18:03:11.089318333Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:11.092256 env[1157]: time="2025-05-15T18:03:11.092183708Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:11.098460 env[1157]: time="2025-05-15T18:03:11.098317282Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:11.107922 env[1157]: time="2025-05-15T18:03:11.107719097Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:11.117352 env[1157]: time="2025-05-15T18:03:11.117258989Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:11.122474 env[1157]: time="2025-05-15T18:03:11.122383906Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:11.127484 env[1157]: time="2025-05-15T18:03:11.127391352Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:11.268318 env[1157]: time="2025-05-15T18:03:11.268169834Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 18:03:11.268318 env[1157]: time="2025-05-15T18:03:11.268311879Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 18:03:11.268692 env[1157]: time="2025-05-15T18:03:11.268346905Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 18:03:11.268692 env[1157]: time="2025-05-15T18:03:11.268573469Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a0c2bc25905ace46acfda7b32a7b407a10fe5613f58766b6af6ed12c72f7ddf3 pid=1595 runtime=io.containerd.runc.v2 May 15 18:03:11.270081 env[1157]: time="2025-05-15T18:03:11.269907146Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 18:03:11.270081 env[1157]: time="2025-05-15T18:03:11.269976245Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 18:03:11.270081 env[1157]: time="2025-05-15T18:03:11.269995421Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 18:03:11.271054 env[1157]: time="2025-05-15T18:03:11.270875038Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2d405812a5f3d5592e611b2fb18fb749c33536c30a292e9a04f73ee737faf5b7 pid=1596 runtime=io.containerd.runc.v2 May 15 18:03:11.304918 systemd[1]: Started cri-containerd-a0c2bc25905ace46acfda7b32a7b407a10fe5613f58766b6af6ed12c72f7ddf3.scope. May 15 18:03:11.328898 systemd[1]: Started cri-containerd-2d405812a5f3d5592e611b2fb18fb749c33536c30a292e9a04f73ee737faf5b7.scope. May 15 18:03:11.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.343000 audit: BPF prog-id=61 op=LOAD May 15 18:03:11.344000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1595 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:11.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130633262633235393035616365343661636664613762333261376234 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1595 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:11.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130633262633235393035616365343661636664613762333261376234 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit: BPF prog-id=62 op=LOAD May 15 18:03:11.344000 audit[1617]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00039ad10 items=0 ppid=1595 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:11.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130633262633235393035616365343661636664613762333261376234 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit: BPF prog-id=63 op=LOAD May 15 18:03:11.344000 audit[1617]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00039ad58 items=0 ppid=1595 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:11.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130633262633235393035616365343661636664613762333261376234 May 15 18:03:11.344000 audit: BPF prog-id=63 op=UNLOAD May 15 18:03:11.344000 audit: BPF prog-id=62 op=UNLOAD May 15 18:03:11.344000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { perfmon } for pid=1617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit[1617]: AVC avc: denied { bpf } for pid=1617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.344000 audit: BPF prog-id=64 op=LOAD May 15 18:03:11.344000 audit[1617]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00039b168 items=0 ppid=1595 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:11.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130633262633235393035616365343661636664613762333261376234 May 15 18:03:11.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.352000 audit: BPF prog-id=65 op=LOAD May 15 18:03:11.353000 audit[1618]: AVC avc: denied { bpf } for pid=1618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.353000 audit[1618]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1596 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:11.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264343035383132613566336435353932653631316232666231386662 May 15 18:03:11.353000 audit[1618]: AVC avc: denied { perfmon } for pid=1618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.353000 audit[1618]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1596 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:11.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264343035383132613566336435353932653631316232666231386662 May 15 18:03:11.353000 audit[1618]: AVC avc: denied { bpf } for pid=1618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.353000 audit[1618]: AVC avc: denied { bpf } for pid=1618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.353000 audit[1618]: AVC avc: denied { bpf } for pid=1618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.353000 audit[1618]: AVC avc: denied { perfmon } for pid=1618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.353000 audit[1618]: AVC avc: denied { perfmon } for pid=1618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.353000 audit[1618]: AVC avc: denied { perfmon } for pid=1618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.353000 audit[1618]: AVC avc: denied { perfmon } for pid=1618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.353000 audit[1618]: AVC avc: denied { perfmon } for pid=1618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.353000 audit[1618]: AVC avc: denied { bpf } for pid=1618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.353000 audit[1618]: AVC avc: denied { bpf } for pid=1618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.353000 audit: BPF prog-id=66 op=LOAD May 15 18:03:11.353000 audit[1618]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00031f990 items=0 ppid=1596 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:11.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264343035383132613566336435353932653631316232666231386662 May 15 18:03:11.354000 audit[1618]: AVC avc: denied { bpf } for pid=1618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.354000 audit[1618]: AVC avc: denied { bpf } for pid=1618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.354000 audit[1618]: AVC avc: denied { perfmon } for pid=1618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.354000 audit[1618]: AVC avc: denied { perfmon } for pid=1618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.354000 audit[1618]: AVC avc: denied { perfmon } for pid=1618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.354000 audit[1618]: AVC avc: denied { perfmon } for pid=1618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.354000 audit[1618]: AVC avc: denied { perfmon } for pid=1618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.354000 audit[1618]: AVC avc: denied { bpf } for pid=1618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.354000 audit[1618]: AVC avc: denied { bpf } for pid=1618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.354000 audit: BPF prog-id=67 op=LOAD May 15 18:03:11.354000 audit[1618]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00031f9d8 items=0 ppid=1596 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:11.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264343035383132613566336435353932653631316232666231386662 May 15 18:03:11.354000 audit: BPF prog-id=67 op=UNLOAD May 15 18:03:11.354000 audit: BPF prog-id=66 op=UNLOAD May 15 18:03:11.354000 audit[1618]: AVC avc: denied { bpf } for pid=1618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.354000 audit[1618]: AVC avc: denied { bpf } for pid=1618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.354000 audit[1618]: AVC avc: denied { bpf } for pid=1618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.354000 audit[1618]: AVC avc: denied { perfmon } for pid=1618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.354000 audit[1618]: AVC avc: denied { perfmon } for pid=1618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.354000 audit[1618]: AVC avc: denied { perfmon } for pid=1618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.354000 audit[1618]: AVC avc: denied { perfmon } for pid=1618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.354000 audit[1618]: AVC avc: denied { perfmon } for pid=1618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.354000 audit[1618]: AVC avc: denied { bpf } for pid=1618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.354000 audit[1618]: AVC avc: denied { bpf } for pid=1618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:11.354000 audit: BPF prog-id=68 op=LOAD May 15 18:03:11.354000 audit[1618]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00031fde8 items=0 ppid=1596 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:11.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264343035383132613566336435353932653631316232666231386662 May 15 18:03:11.368058 env[1157]: time="2025-05-15T18:03:11.367590624Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-cpjp2,Uid:84ba81ff-563f-40d8-9756-9c6f15660009,Namespace:calico-system,Attempt:0,} returns sandbox id \"a0c2bc25905ace46acfda7b32a7b407a10fe5613f58766b6af6ed12c72f7ddf3\"" May 15 18:03:11.371236 env[1157]: time="2025-05-15T18:03:11.371133397Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 15 18:03:11.377192 env[1157]: time="2025-05-15T18:03:11.377150154Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6vrmb,Uid:eca799c9-d9b7-4874-b1b7-b07d8ca0dd4e,Namespace:kube-system,Attempt:0,} returns sandbox id \"2d405812a5f3d5592e611b2fb18fb749c33536c30a292e9a04f73ee737faf5b7\"" May 15 18:03:11.485873 kubelet[1465]: E0515 18:03:11.485700 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:12.486708 kubelet[1465]: E0515 18:03:12.486532 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:12.822340 kubelet[1465]: E0515 18:03:12.822262 1465 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rnqf2" podUID="c728858b-b0dc-4cc7-831f-32aa358609d7" May 15 18:03:13.487263 kubelet[1465]: E0515 18:03:13.487060 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:13.673455 update_engine[1148]: I0515 18:03:13.672859 1148 update_attempter.cc:509] Updating boot flags... May 15 18:03:13.923212 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1831181947.mount: Deactivated successfully. May 15 18:03:14.295978 env[1157]: time="2025-05-15T18:03:14.295421949Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:14.303800 env[1157]: time="2025-05-15T18:03:14.303736001Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:14.306754 env[1157]: time="2025-05-15T18:03:14.306704983Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:14.311858 env[1157]: time="2025-05-15T18:03:14.311827577Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:14.313694 env[1157]: time="2025-05-15T18:03:14.313633068Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 15 18:03:14.319705 env[1157]: time="2025-05-15T18:03:14.319676628Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.13\"" May 15 18:03:14.323539 env[1157]: time="2025-05-15T18:03:14.323453312Z" level=info msg="CreateContainer within sandbox \"a0c2bc25905ace46acfda7b32a7b407a10fe5613f58766b6af6ed12c72f7ddf3\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 18:03:14.368404 env[1157]: time="2025-05-15T18:03:14.368326329Z" level=info msg="CreateContainer within sandbox \"a0c2bc25905ace46acfda7b32a7b407a10fe5613f58766b6af6ed12c72f7ddf3\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"9f50d4258b2538c7ffee9a3ef920f1a84a4a5d1ca0be7d2daa853bfee35467e6\"" May 15 18:03:14.372216 env[1157]: time="2025-05-15T18:03:14.372040404Z" level=info msg="StartContainer for \"9f50d4258b2538c7ffee9a3ef920f1a84a4a5d1ca0be7d2daa853bfee35467e6\"" May 15 18:03:14.440441 systemd[1]: Started cri-containerd-9f50d4258b2538c7ffee9a3ef920f1a84a4a5d1ca0be7d2daa853bfee35467e6.scope. May 15 18:03:14.467000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.469848 kernel: kauditd_printk_skb: 146 callbacks suppressed May 15 18:03:14.470040 kernel: audit: type=1400 audit(1747332194.467:478): avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.476641 kernel: audit: type=1300 audit(1747332194.467:478): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7feafa90dcb8 items=0 ppid=1595 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:14.467000 audit[1685]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7feafa90dcb8 items=0 ppid=1595 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:14.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966353064343235386232353338633766666565396133656639323066 May 15 18:03:14.493211 kernel: audit: type=1327 audit(1747332194.467:478): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966353064343235386232353338633766666565396133656639323066 May 15 18:03:14.493283 kubelet[1465]: E0515 18:03:14.493246 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:14.473000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.497710 kernel: audit: type=1400 audit(1747332194.473:479): avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.497761 kernel: audit: type=1400 audit(1747332194.473:479): avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.473000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.503676 kernel: audit: type=1400 audit(1747332194.473:479): avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.473000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.473000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.515591 kernel: audit: type=1400 audit(1747332194.473:479): avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.515686 kernel: audit: type=1400 audit(1747332194.473:479): avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.473000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.473000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.473000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.532773 kernel: audit: type=1400 audit(1747332194.473:479): avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.532861 kernel: audit: type=1400 audit(1747332194.473:479): avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.473000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.473000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.473000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.473000 audit: BPF prog-id=69 op=LOAD May 15 18:03:14.473000 audit[1685]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001bdbb8 items=0 ppid=1595 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:14.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966353064343235386232353338633766666565396133656639323066 May 15 18:03:14.479000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.479000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.479000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.479000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.479000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.479000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.479000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.479000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.479000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.479000 audit: BPF prog-id=70 op=LOAD May 15 18:03:14.479000 audit[1685]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001bdc08 items=0 ppid=1595 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:14.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966353064343235386232353338633766666565396133656639323066 May 15 18:03:14.486000 audit: BPF prog-id=70 op=UNLOAD May 15 18:03:14.486000 audit: BPF prog-id=69 op=UNLOAD May 15 18:03:14.486000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.486000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.486000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.486000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.486000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.486000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.486000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.486000 audit[1685]: AVC avc: denied { perfmon } for pid=1685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.486000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.486000 audit[1685]: AVC avc: denied { bpf } for pid=1685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:14.486000 audit: BPF prog-id=71 op=LOAD May 15 18:03:14.486000 audit[1685]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001bdc98 items=0 ppid=1595 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:14.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966353064343235386232353338633766666565396133656639323066 May 15 18:03:14.559668 env[1157]: time="2025-05-15T18:03:14.558332228Z" level=info msg="StartContainer for \"9f50d4258b2538c7ffee9a3ef920f1a84a4a5d1ca0be7d2daa853bfee35467e6\" returns successfully" May 15 18:03:14.569657 systemd[1]: cri-containerd-9f50d4258b2538c7ffee9a3ef920f1a84a4a5d1ca0be7d2daa853bfee35467e6.scope: Deactivated successfully. May 15 18:03:14.572000 audit: BPF prog-id=71 op=UNLOAD May 15 18:03:14.702170 systemd[1]: run-containerd-runc-k8s.io-9f50d4258b2538c7ffee9a3ef920f1a84a4a5d1ca0be7d2daa853bfee35467e6-runc.N5lmqs.mount: Deactivated successfully. May 15 18:03:14.702429 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9f50d4258b2538c7ffee9a3ef920f1a84a4a5d1ca0be7d2daa853bfee35467e6-rootfs.mount: Deactivated successfully. May 15 18:03:14.752440 env[1157]: time="2025-05-15T18:03:14.752131812Z" level=info msg="shim disconnected" id=9f50d4258b2538c7ffee9a3ef920f1a84a4a5d1ca0be7d2daa853bfee35467e6 May 15 18:03:14.752440 env[1157]: time="2025-05-15T18:03:14.752394623Z" level=warning msg="cleaning up after shim disconnected" id=9f50d4258b2538c7ffee9a3ef920f1a84a4a5d1ca0be7d2daa853bfee35467e6 namespace=k8s.io May 15 18:03:14.752440 env[1157]: time="2025-05-15T18:03:14.752440720Z" level=info msg="cleaning up dead shim" May 15 18:03:14.788463 env[1157]: time="2025-05-15T18:03:14.788384022Z" level=warning msg="cleanup warnings time=\"2025-05-15T18:03:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1728 runtime=io.containerd.runc.v2\n" May 15 18:03:14.824744 kubelet[1465]: E0515 18:03:14.824035 1465 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rnqf2" podUID="c728858b-b0dc-4cc7-831f-32aa358609d7" May 15 18:03:15.493536 kubelet[1465]: E0515 18:03:15.493489 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:16.285684 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1523514281.mount: Deactivated successfully. May 15 18:03:16.493910 kubelet[1465]: E0515 18:03:16.493819 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:16.825250 kubelet[1465]: E0515 18:03:16.824757 1465 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rnqf2" podUID="c728858b-b0dc-4cc7-831f-32aa358609d7" May 15 18:03:17.272051 env[1157]: time="2025-05-15T18:03:17.271827081Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:17.282295 env[1157]: time="2025-05-15T18:03:17.282218799Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a6946560b0b088b01f40a556d2a76b533da279a3388986e087fae04b73f8ad24,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:17.286930 env[1157]: time="2025-05-15T18:03:17.286847460Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:17.291162 env[1157]: time="2025-05-15T18:03:17.291018124Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f68590d1921db1f9a9b56898a66cf3c67fcdcb5be132f7640af8ac1297371e4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:17.292267 env[1157]: time="2025-05-15T18:03:17.292162477Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.13\" returns image reference \"sha256:a6946560b0b088b01f40a556d2a76b533da279a3388986e087fae04b73f8ad24\"" May 15 18:03:17.298310 env[1157]: time="2025-05-15T18:03:17.298263748Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 15 18:03:17.301472 env[1157]: time="2025-05-15T18:03:17.301327207Z" level=info msg="CreateContainer within sandbox \"2d405812a5f3d5592e611b2fb18fb749c33536c30a292e9a04f73ee737faf5b7\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 15 18:03:17.335885 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1403361243.mount: Deactivated successfully. May 15 18:03:17.353362 env[1157]: time="2025-05-15T18:03:17.353293272Z" level=info msg="CreateContainer within sandbox \"2d405812a5f3d5592e611b2fb18fb749c33536c30a292e9a04f73ee737faf5b7\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d5d17c1b43e77092a238774cb63f54813f8b345eb8c8da163c0f1abfd3ade8de\"" May 15 18:03:17.355679 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1963251551.mount: Deactivated successfully. May 15 18:03:17.356512 env[1157]: time="2025-05-15T18:03:17.356184639Z" level=info msg="StartContainer for \"d5d17c1b43e77092a238774cb63f54813f8b345eb8c8da163c0f1abfd3ade8de\"" May 15 18:03:17.386122 systemd[1]: Started cri-containerd-d5d17c1b43e77092a238774cb63f54813f8b345eb8c8da163c0f1abfd3ade8de.scope. May 15 18:03:17.409000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.409000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff2a408d078 items=0 ppid=1596 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435643137633162343365373730393261323338373734636236336635 May 15 18:03:17.409000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.409000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.409000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.409000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.409000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.409000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.409000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.409000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.409000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.409000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.409000 audit: BPF prog-id=72 op=LOAD May 15 18:03:17.409000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002c9f98 items=0 ppid=1596 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435643137633162343365373730393261323338373734636236336635 May 15 18:03:17.410000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.410000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.410000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.410000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.410000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.410000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.410000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.410000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.410000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.410000 audit: BPF prog-id=73 op=LOAD May 15 18:03:17.410000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002c9fe8 items=0 ppid=1596 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435643137633162343365373730393261323338373734636236336635 May 15 18:03:17.411000 audit: BPF prog-id=73 op=UNLOAD May 15 18:03:17.411000 audit: BPF prog-id=72 op=UNLOAD May 15 18:03:17.411000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.411000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.411000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.411000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.411000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.411000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.411000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.411000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.411000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.411000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:17.411000 audit: BPF prog-id=74 op=LOAD May 15 18:03:17.411000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003ba078 items=0 ppid=1596 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435643137633162343365373730393261323338373734636236336635 May 15 18:03:17.432766 env[1157]: time="2025-05-15T18:03:17.432710154Z" level=info msg="StartContainer for \"d5d17c1b43e77092a238774cb63f54813f8b345eb8c8da163c0f1abfd3ade8de\" returns successfully" May 15 18:03:17.494625 kubelet[1465]: E0515 18:03:17.494535 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:17.566000 audit[1803]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1803 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:17.566000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc52e7a5a0 a2=0 a3=7ffc52e7a58c items=0 ppid=1763 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.566000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 18:03:17.568000 audit[1804]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:17.568000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7a4f4a10 a2=0 a3=7ffc7a4f49fc items=0 ppid=1763 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.568000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 18:03:17.570000 audit[1805]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:17.570000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc1e84e50 a2=0 a3=7fffc1e84e3c items=0 ppid=1763 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.570000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 18:03:17.583000 audit[1806]: NETFILTER_CFG table=mangle:17 family=10 entries=1 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.583000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe62191160 a2=0 a3=7ffe6219114c items=0 ppid=1763 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.583000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 18:03:17.586000 audit[1807]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.586000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcae7c1050 a2=0 a3=7ffcae7c103c items=0 ppid=1763 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.586000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 18:03:17.588000 audit[1808]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.588000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe39e27a80 a2=0 a3=7ffe39e27a6c items=0 ppid=1763 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.588000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 18:03:17.671000 audit[1810]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1810 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:17.671000 audit[1810]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff99540fd0 a2=0 a3=7fff99540fbc items=0 ppid=1763 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.671000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 18:03:17.679000 audit[1812]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1812 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:17.679000 audit[1812]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe32677e90 a2=0 a3=7ffe32677e7c items=0 ppid=1763 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.679000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 15 18:03:17.688000 audit[1815]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1815 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:17.688000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffba8fa2d0 a2=0 a3=7fffba8fa2bc items=0 ppid=1763 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.688000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 15 18:03:17.692000 audit[1816]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:17.692000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc7549100 a2=0 a3=7ffdc75490ec items=0 ppid=1763 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.692000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 18:03:17.699000 audit[1818]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1818 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:17.699000 audit[1818]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff95ac32b0 a2=0 a3=7fff95ac329c items=0 ppid=1763 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.699000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 18:03:17.702000 audit[1819]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1819 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:17.702000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed296cd40 a2=0 a3=7ffed296cd2c items=0 ppid=1763 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.702000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 18:03:17.709000 audit[1821]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1821 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:17.709000 audit[1821]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff82092690 a2=0 a3=7fff8209267c items=0 ppid=1763 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.709000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 18:03:17.718000 audit[1824]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:17.718000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe277e2f80 a2=0 a3=7ffe277e2f6c items=0 ppid=1763 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.718000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 15 18:03:17.721000 audit[1825]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1825 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:17.721000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff64bf6560 a2=0 a3=7fff64bf654c items=0 ppid=1763 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.721000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 18:03:17.730000 audit[1827]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1827 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:17.730000 audit[1827]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc18fb3a20 a2=0 a3=7ffc18fb3a0c items=0 ppid=1763 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.730000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 18:03:17.734000 audit[1828]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1828 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:17.734000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe22a834c0 a2=0 a3=7ffe22a834ac items=0 ppid=1763 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.734000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 18:03:17.742000 audit[1830]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1830 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:17.742000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff2f3b84f0 a2=0 a3=7fff2f3b84dc items=0 ppid=1763 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.742000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 18:03:17.753000 audit[1833]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1833 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:17.753000 audit[1833]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffe20f0460 a2=0 a3=7fffe20f044c items=0 ppid=1763 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 18:03:17.762000 audit[1836]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:17.762000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff85670d30 a2=0 a3=7fff85670d1c items=0 ppid=1763 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.762000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 18:03:17.764000 audit[1837]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1837 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:17.764000 audit[1837]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd60a4ca70 a2=0 a3=7ffd60a4ca5c items=0 ppid=1763 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.764000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 18:03:17.770000 audit[1839]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1839 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:17.770000 audit[1839]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcd8970f40 a2=0 a3=7ffcd8970f2c items=0 ppid=1763 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.770000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 18:03:17.837000 audit[1844]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1844 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:17.837000 audit[1844]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe6b88ddb0 a2=0 a3=7ffe6b88dd9c items=0 ppid=1763 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.837000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 18:03:17.839000 audit[1845]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1845 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:17.839000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe93255a40 a2=0 a3=7ffe93255a2c items=0 ppid=1763 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.839000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 18:03:17.846000 audit[1847]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1847 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 18:03:17.846000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffeeb516c00 a2=0 a3=7ffeeb516bec items=0 ppid=1763 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.846000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 18:03:17.864000 audit[1853]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1853 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 18:03:17.864000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd749fd650 a2=0 a3=7ffd749fd63c items=0 ppid=1763 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.864000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 18:03:17.901000 audit[1853]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=1853 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 18:03:17.901000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffd749fd650 a2=0 a3=7ffd749fd63c items=0 ppid=1763 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.901000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 18:03:17.921000 audit[1861]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1861 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.921000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc7afcb320 a2=0 a3=7ffc7afcb30c items=0 ppid=1763 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.921000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 18:03:17.927000 audit[1863]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1863 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.927000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffefdad7fb0 a2=0 a3=7ffefdad7f9c items=0 ppid=1763 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.927000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 15 18:03:17.934000 audit[1866]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1866 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.934000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd50c81b80 a2=0 a3=7ffd50c81b6c items=0 ppid=1763 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.934000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 15 18:03:17.937000 audit[1867]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.937000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3733d170 a2=0 a3=7ffd3733d15c items=0 ppid=1763 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.937000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 18:03:17.942000 audit[1869]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1869 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.942000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeaaec8f10 a2=0 a3=7ffeaaec8efc items=0 ppid=1763 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.942000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 18:03:17.945000 audit[1870]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1870 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.945000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4b7c1070 a2=0 a3=7ffd4b7c105c items=0 ppid=1763 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.945000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 18:03:17.950000 audit[1872]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1872 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.950000 audit[1872]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff3b98b080 a2=0 a3=7fff3b98b06c items=0 ppid=1763 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.950000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 15 18:03:17.954000 audit[1875]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1875 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.954000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcb8691790 a2=0 a3=7ffcb869177c items=0 ppid=1763 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.954000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 18:03:17.955000 audit[1876]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1876 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.955000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9fd49ce0 a2=0 a3=7ffc9fd49ccc items=0 ppid=1763 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.955000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 18:03:17.961000 audit[1878]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1878 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.961000 audit[1878]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffccd5e4c30 a2=0 a3=7ffccd5e4c1c items=0 ppid=1763 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.961000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 18:03:17.963000 audit[1879]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1879 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.963000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf9db77f0 a2=0 a3=7ffdf9db77dc items=0 ppid=1763 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.963000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 18:03:17.966000 audit[1881]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1881 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.966000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc944b3690 a2=0 a3=7ffc944b367c items=0 ppid=1763 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.966000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 18:03:17.970000 audit[1884]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1884 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.970000 audit[1884]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff920a5020 a2=0 a3=7fff920a500c items=0 ppid=1763 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.970000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 18:03:17.975000 audit[1887]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1887 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.975000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb97610e0 a2=0 a3=7ffdb97610cc items=0 ppid=1763 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.975000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 15 18:03:17.977000 audit[1888]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1888 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.977000 audit[1888]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeb34233b0 a2=0 a3=7ffeb342339c items=0 ppid=1763 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.977000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 18:03:17.979000 audit[1890]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1890 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.979000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdc22d1360 a2=0 a3=7ffdc22d134c items=0 ppid=1763 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.979000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 18:03:17.985000 audit[1893]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1893 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.985000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcd04f0cf0 a2=0 a3=7ffcd04f0cdc items=0 ppid=1763 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.985000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 18:03:17.986000 audit[1894]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1894 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.986000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb9007e90 a2=0 a3=7ffcb9007e7c items=0 ppid=1763 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.986000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 18:03:17.991000 audit[1896]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1896 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.991000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffee2491430 a2=0 a3=7ffee249141c items=0 ppid=1763 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.991000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 18:03:17.993000 audit[1897]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1897 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.993000 audit[1897]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea120adc0 a2=0 a3=7ffea120adac items=0 ppid=1763 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.993000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 18:03:17.996000 audit[1899]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1899 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:17.996000 audit[1899]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdf27da110 a2=0 a3=7ffdf27da0fc items=0 ppid=1763 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:17.996000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 18:03:18.001000 audit[1902]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1902 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 18:03:18.001000 audit[1902]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe9db93a20 a2=0 a3=7ffe9db93a0c items=0 ppid=1763 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:18.001000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 18:03:18.005000 audit[1904]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1904 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 18:03:18.005000 audit[1904]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffe743761f0 a2=0 a3=7ffe743761dc items=0 ppid=1763 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:18.005000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 18:03:18.006000 audit[1904]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1904 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 18:03:18.006000 audit[1904]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe743761f0 a2=0 a3=7ffe743761dc items=0 ppid=1763 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:18.006000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 18:03:18.496086 kubelet[1465]: E0515 18:03:18.495800 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:18.821965 kubelet[1465]: E0515 18:03:18.821876 1465 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rnqf2" podUID="c728858b-b0dc-4cc7-831f-32aa358609d7" May 15 18:03:19.496479 kubelet[1465]: E0515 18:03:19.496403 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:20.497186 kubelet[1465]: E0515 18:03:20.497090 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:20.823962 kubelet[1465]: E0515 18:03:20.823082 1465 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rnqf2" podUID="c728858b-b0dc-4cc7-831f-32aa358609d7" May 15 18:03:21.498506 kubelet[1465]: E0515 18:03:21.498423 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:22.499009 kubelet[1465]: E0515 18:03:22.498900 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:22.826318 kubelet[1465]: E0515 18:03:22.826208 1465 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rnqf2" podUID="c728858b-b0dc-4cc7-831f-32aa358609d7" May 15 18:03:23.499530 kubelet[1465]: E0515 18:03:23.499453 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:24.502456 kubelet[1465]: E0515 18:03:24.501806 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:24.829156 kubelet[1465]: E0515 18:03:24.825993 1465 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rnqf2" podUID="c728858b-b0dc-4cc7-831f-32aa358609d7" May 15 18:03:25.502477 kubelet[1465]: E0515 18:03:25.502350 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:25.651606 env[1157]: time="2025-05-15T18:03:25.651165883Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:25.656997 env[1157]: time="2025-05-15T18:03:25.656904218Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:25.660691 env[1157]: time="2025-05-15T18:03:25.660611958Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:25.665733 env[1157]: time="2025-05-15T18:03:25.665611779Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 15 18:03:25.667462 env[1157]: time="2025-05-15T18:03:25.663912864Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:25.675054 env[1157]: time="2025-05-15T18:03:25.674968055Z" level=info msg="CreateContainer within sandbox \"a0c2bc25905ace46acfda7b32a7b407a10fe5613f58766b6af6ed12c72f7ddf3\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 18:03:25.715183 env[1157]: time="2025-05-15T18:03:25.715100423Z" level=info msg="CreateContainer within sandbox \"a0c2bc25905ace46acfda7b32a7b407a10fe5613f58766b6af6ed12c72f7ddf3\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7ed7906e4e7012d9c60b39204d17f3e18adb8c6e5bc9a4ad415fe35de2f6cfea\"" May 15 18:03:25.715960 env[1157]: time="2025-05-15T18:03:25.715913427Z" level=info msg="StartContainer for \"7ed7906e4e7012d9c60b39204d17f3e18adb8c6e5bc9a4ad415fe35de2f6cfea\"" May 15 18:03:25.719378 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3089922186.mount: Deactivated successfully. May 15 18:03:25.764262 systemd[1]: Started cri-containerd-7ed7906e4e7012d9c60b39204d17f3e18adb8c6e5bc9a4ad415fe35de2f6cfea.scope. May 15 18:03:25.800234 kernel: kauditd_printk_skb: 230 callbacks suppressed May 15 18:03:25.800500 kernel: audit: type=1400 audit(1747332205.793:542): avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.793000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.793000 audit[1913]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f30f2edd2f8 items=0 ppid=1595 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:25.808694 kernel: audit: type=1300 audit(1747332205.793:542): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f30f2edd2f8 items=0 ppid=1595 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:25.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765643739303665346537303132643963363062333932303464313766 May 15 18:03:25.815567 kernel: audit: type=1327 audit(1747332205.793:542): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765643739303665346537303132643963363062333932303464313766 May 15 18:03:25.793000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.821573 kernel: audit: type=1400 audit(1747332205.793:543): avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.793000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.793000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.833830 kernel: audit: type=1400 audit(1747332205.793:543): avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.837654 kernel: audit: type=1400 audit(1747332205.793:543): avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.837706 kernel: audit: type=1400 audit(1747332205.793:543): avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.793000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.793000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.843754 env[1157]: time="2025-05-15T18:03:25.843692899Z" level=info msg="StartContainer for \"7ed7906e4e7012d9c60b39204d17f3e18adb8c6e5bc9a4ad415fe35de2f6cfea\" returns successfully" May 15 18:03:25.844322 kernel: audit: type=1400 audit(1747332205.793:543): avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.793000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.793000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.854636 kernel: audit: type=1400 audit(1747332205.793:543): avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.854719 kernel: audit: type=1400 audit(1747332205.793:543): avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.793000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.793000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.793000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.793000 audit: BPF prog-id=75 op=LOAD May 15 18:03:25.793000 audit[1913]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024258 items=0 ppid=1595 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:25.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765643739303665346537303132643963363062333932303464313766 May 15 18:03:25.799000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.799000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.799000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.799000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.799000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.799000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.799000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.799000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.799000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.799000 audit: BPF prog-id=76 op=LOAD May 15 18:03:25.799000 audit[1913]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000242a8 items=0 ppid=1595 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:25.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765643739303665346537303132643963363062333932303464313766 May 15 18:03:25.799000 audit: BPF prog-id=76 op=UNLOAD May 15 18:03:25.799000 audit: BPF prog-id=75 op=UNLOAD May 15 18:03:25.799000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.799000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.799000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.799000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.799000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.799000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.799000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.799000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.799000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.799000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:25.799000 audit: BPF prog-id=77 op=LOAD May 15 18:03:25.799000 audit[1913]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024338 items=0 ppid=1595 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:25.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765643739303665346537303132643963363062333932303464313766 May 15 18:03:26.089907 kubelet[1465]: I0515 18:03:26.089727 1465 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-6vrmb" podStartSLOduration=12.173136067 podStartE2EDuration="18.089649094s" podCreationTimestamp="2025-05-15 18:03:08 +0000 UTC" firstStartedPulling="2025-05-15 18:03:11.379144398 +0000 UTC m=+3.756201981" lastFinishedPulling="2025-05-15 18:03:17.295657375 +0000 UTC m=+9.672715008" observedRunningTime="2025-05-15 18:03:18.041804254 +0000 UTC m=+10.418861857" watchObservedRunningTime="2025-05-15 18:03:26.089649094 +0000 UTC m=+18.466706727" May 15 18:03:26.504628 kubelet[1465]: E0515 18:03:26.504405 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:26.700325 systemd[1]: run-containerd-runc-k8s.io-7ed7906e4e7012d9c60b39204d17f3e18adb8c6e5bc9a4ad415fe35de2f6cfea-runc.t3VcY6.mount: Deactivated successfully. May 15 18:03:26.823273 kubelet[1465]: E0515 18:03:26.823185 1465 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rnqf2" podUID="c728858b-b0dc-4cc7-831f-32aa358609d7" May 15 18:03:27.221060 env[1157]: time="2025-05-15T18:03:27.219851145Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 18:03:27.231988 systemd[1]: cri-containerd-7ed7906e4e7012d9c60b39204d17f3e18adb8c6e5bc9a4ad415fe35de2f6cfea.scope: Deactivated successfully. May 15 18:03:27.243000 audit: BPF prog-id=77 op=UNLOAD May 15 18:03:27.238150 systemd[1]: cri-containerd-7ed7906e4e7012d9c60b39204d17f3e18adb8c6e5bc9a4ad415fe35de2f6cfea.scope: Consumed 1.038s CPU time. May 15 18:03:27.295761 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7ed7906e4e7012d9c60b39204d17f3e18adb8c6e5bc9a4ad415fe35de2f6cfea-rootfs.mount: Deactivated successfully. May 15 18:03:27.301248 kubelet[1465]: I0515 18:03:27.300774 1465 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 15 18:03:27.506296 kubelet[1465]: E0515 18:03:27.506021 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:28.480193 kubelet[1465]: E0515 18:03:28.480099 1465 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:28.508510 kubelet[1465]: E0515 18:03:28.508343 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:28.699366 env[1157]: time="2025-05-15T18:03:28.699261801Z" level=info msg="shim disconnected" id=7ed7906e4e7012d9c60b39204d17f3e18adb8c6e5bc9a4ad415fe35de2f6cfea May 15 18:03:28.700361 env[1157]: time="2025-05-15T18:03:28.700307009Z" level=warning msg="cleaning up after shim disconnected" id=7ed7906e4e7012d9c60b39204d17f3e18adb8c6e5bc9a4ad415fe35de2f6cfea namespace=k8s.io May 15 18:03:28.700747 env[1157]: time="2025-05-15T18:03:28.700701309Z" level=info msg="cleaning up dead shim" May 15 18:03:28.753279 env[1157]: time="2025-05-15T18:03:28.752845953Z" level=warning msg="cleanup warnings time=\"2025-05-15T18:03:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1953 runtime=io.containerd.runc.v2\n" May 15 18:03:28.841613 systemd[1]: Created slice kubepods-besteffort-podc728858b_b0dc_4cc7_831f_32aa358609d7.slice. May 15 18:03:28.853623 env[1157]: time="2025-05-15T18:03:28.850877041Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rnqf2,Uid:c728858b-b0dc-4cc7-831f-32aa358609d7,Namespace:calico-system,Attempt:0,}" May 15 18:03:28.994104 env[1157]: time="2025-05-15T18:03:28.993911386Z" level=error msg="Failed to destroy network for sandbox \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 18:03:28.997039 env[1157]: time="2025-05-15T18:03:28.996969298Z" level=error msg="encountered an error cleaning up failed sandbox \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 18:03:28.997260 env[1157]: time="2025-05-15T18:03:28.997217293Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rnqf2,Uid:c728858b-b0dc-4cc7-831f-32aa358609d7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 18:03:28.998283 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562-shm.mount: Deactivated successfully. May 15 18:03:29.000403 kubelet[1465]: E0515 18:03:29.000262 1465 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 18:03:29.000657 kubelet[1465]: E0515 18:03:29.000542 1465 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-rnqf2" May 15 18:03:29.000745 kubelet[1465]: E0515 18:03:29.000693 1465 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-rnqf2" May 15 18:03:29.002112 kubelet[1465]: E0515 18:03:29.002018 1465 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-rnqf2_calico-system(c728858b-b0dc-4cc7-831f-32aa358609d7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-rnqf2_calico-system(c728858b-b0dc-4cc7-831f-32aa358609d7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rnqf2" podUID="c728858b-b0dc-4cc7-831f-32aa358609d7" May 15 18:03:29.007794 env[1157]: time="2025-05-15T18:03:29.007702427Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 15 18:03:29.010648 kubelet[1465]: I0515 18:03:29.010468 1465 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" May 15 18:03:29.011968 env[1157]: time="2025-05-15T18:03:29.011897561Z" level=info msg="StopPodSandbox for \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\"" May 15 18:03:29.066292 env[1157]: time="2025-05-15T18:03:29.066202389Z" level=error msg="StopPodSandbox for \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\" failed" error="failed to destroy network for sandbox \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 18:03:29.066611 kubelet[1465]: E0515 18:03:29.066533 1465 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" May 15 18:03:29.066720 kubelet[1465]: E0515 18:03:29.066644 1465 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562"} May 15 18:03:29.066780 kubelet[1465]: E0515 18:03:29.066742 1465 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c728858b-b0dc-4cc7-831f-32aa358609d7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 18:03:29.066872 kubelet[1465]: E0515 18:03:29.066787 1465 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c728858b-b0dc-4cc7-831f-32aa358609d7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rnqf2" podUID="c728858b-b0dc-4cc7-831f-32aa358609d7" May 15 18:03:29.509204 kubelet[1465]: E0515 18:03:29.508902 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:30.510207 kubelet[1465]: E0515 18:03:30.510034 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:31.511621 kubelet[1465]: E0515 18:03:31.511400 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:32.512739 kubelet[1465]: E0515 18:03:32.512686 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:33.513423 kubelet[1465]: E0515 18:03:33.513033 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:34.514749 kubelet[1465]: E0515 18:03:34.514540 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:35.515820 kubelet[1465]: E0515 18:03:35.515758 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:35.669002 kubelet[1465]: I0515 18:03:35.668857 1465 topology_manager.go:215] "Topology Admit Handler" podUID="4d6c7e15-9489-4d73-8950-20545cf971db" podNamespace="default" podName="nginx-deployment-85f456d6dd-w6x7g" May 15 18:03:35.684090 systemd[1]: Created slice kubepods-besteffort-pod4d6c7e15_9489_4d73_8950_20545cf971db.slice. May 15 18:03:35.790264 kubelet[1465]: I0515 18:03:35.789940 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-85g66\" (UniqueName: \"kubernetes.io/projected/4d6c7e15-9489-4d73-8950-20545cf971db-kube-api-access-85g66\") pod \"nginx-deployment-85f456d6dd-w6x7g\" (UID: \"4d6c7e15-9489-4d73-8950-20545cf971db\") " pod="default/nginx-deployment-85f456d6dd-w6x7g" May 15 18:03:35.996623 env[1157]: time="2025-05-15T18:03:35.996447061Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-w6x7g,Uid:4d6c7e15-9489-4d73-8950-20545cf971db,Namespace:default,Attempt:0,}" May 15 18:03:36.165529 env[1157]: time="2025-05-15T18:03:36.165448224Z" level=error msg="Failed to destroy network for sandbox \"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 18:03:36.167600 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a-shm.mount: Deactivated successfully. May 15 18:03:36.168411 env[1157]: time="2025-05-15T18:03:36.168363280Z" level=error msg="encountered an error cleaning up failed sandbox \"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 18:03:36.168909 env[1157]: time="2025-05-15T18:03:36.168742622Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-w6x7g,Uid:4d6c7e15-9489-4d73-8950-20545cf971db,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 18:03:36.169678 kubelet[1465]: E0515 18:03:36.169527 1465 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 18:03:36.169806 kubelet[1465]: E0515 18:03:36.169774 1465 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-w6x7g" May 15 18:03:36.169877 kubelet[1465]: E0515 18:03:36.169818 1465 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-w6x7g" May 15 18:03:36.170583 kubelet[1465]: E0515 18:03:36.170486 1465 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-w6x7g_default(4d6c7e15-9489-4d73-8950-20545cf971db)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-w6x7g_default(4d6c7e15-9489-4d73-8950-20545cf971db)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-w6x7g" podUID="4d6c7e15-9489-4d73-8950-20545cf971db" May 15 18:03:36.519537 kubelet[1465]: E0515 18:03:36.517640 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:37.062618 kubelet[1465]: I0515 18:03:37.061673 1465 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" May 15 18:03:37.064749 env[1157]: time="2025-05-15T18:03:37.064680265Z" level=info msg="StopPodSandbox for \"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a\"" May 15 18:03:37.148181 env[1157]: time="2025-05-15T18:03:37.148112121Z" level=error msg="StopPodSandbox for \"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a\" failed" error="failed to destroy network for sandbox \"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 18:03:37.149097 kubelet[1465]: E0515 18:03:37.148684 1465 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" May 15 18:03:37.149097 kubelet[1465]: E0515 18:03:37.148775 1465 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a"} May 15 18:03:37.149097 kubelet[1465]: E0515 18:03:37.148922 1465 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4d6c7e15-9489-4d73-8950-20545cf971db\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 18:03:37.149097 kubelet[1465]: E0515 18:03:37.149012 1465 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4d6c7e15-9489-4d73-8950-20545cf971db\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-w6x7g" podUID="4d6c7e15-9489-4d73-8950-20545cf971db" May 15 18:03:37.519436 kubelet[1465]: E0515 18:03:37.518592 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:38.520387 kubelet[1465]: E0515 18:03:38.519962 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:39.520654 kubelet[1465]: E0515 18:03:39.520539 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:39.823641 env[1157]: time="2025-05-15T18:03:39.823455296Z" level=info msg="StopPodSandbox for \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\"" May 15 18:03:39.898815 env[1157]: time="2025-05-15T18:03:39.898735625Z" level=error msg="StopPodSandbox for \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\" failed" error="failed to destroy network for sandbox \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 18:03:39.899631 kubelet[1465]: E0515 18:03:39.899515 1465 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" May 15 18:03:39.899749 kubelet[1465]: E0515 18:03:39.899663 1465 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562"} May 15 18:03:39.899819 kubelet[1465]: E0515 18:03:39.899786 1465 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c728858b-b0dc-4cc7-831f-32aa358609d7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 18:03:39.900079 kubelet[1465]: E0515 18:03:39.899866 1465 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c728858b-b0dc-4cc7-831f-32aa358609d7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rnqf2" podUID="c728858b-b0dc-4cc7-831f-32aa358609d7" May 15 18:03:40.520928 kubelet[1465]: E0515 18:03:40.520746 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:41.521644 kubelet[1465]: E0515 18:03:41.521421 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:41.842574 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2039592435.mount: Deactivated successfully. May 15 18:03:41.902533 env[1157]: time="2025-05-15T18:03:41.902413592Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:41.910731 env[1157]: time="2025-05-15T18:03:41.910649391Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:41.913910 env[1157]: time="2025-05-15T18:03:41.913833777Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:41.918575 env[1157]: time="2025-05-15T18:03:41.918464862Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:41.921344 env[1157]: time="2025-05-15T18:03:41.921215264Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 15 18:03:41.979068 env[1157]: time="2025-05-15T18:03:41.978973661Z" level=info msg="CreateContainer within sandbox \"a0c2bc25905ace46acfda7b32a7b407a10fe5613f58766b6af6ed12c72f7ddf3\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 18:03:42.012618 env[1157]: time="2025-05-15T18:03:42.011978386Z" level=info msg="CreateContainer within sandbox \"a0c2bc25905ace46acfda7b32a7b407a10fe5613f58766b6af6ed12c72f7ddf3\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"76415a5effde0ff6da0951d4e2a7d04c4b048a318ef4ffc3ee30a3fab3d52c09\"" May 15 18:03:42.013745 env[1157]: time="2025-05-15T18:03:42.013673705Z" level=info msg="StartContainer for \"76415a5effde0ff6da0951d4e2a7d04c4b048a318ef4ffc3ee30a3fab3d52c09\"" May 15 18:03:42.014779 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3188791910.mount: Deactivated successfully. May 15 18:03:42.060123 systemd[1]: Started cri-containerd-76415a5effde0ff6da0951d4e2a7d04c4b048a318ef4ffc3ee30a3fab3d52c09.scope. May 15 18:03:42.110120 kernel: kauditd_printk_skb: 34 callbacks suppressed May 15 18:03:42.110524 kernel: audit: type=1400 audit(1747332222.102:549): avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.102000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.102000 audit[2109]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd94c5efb48 items=0 ppid=1595 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:42.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736343135613565666664653066663664613039353164346532613764 May 15 18:03:42.129220 kernel: audit: type=1300 audit(1747332222.102:549): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd94c5efb48 items=0 ppid=1595 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:42.129372 kernel: audit: type=1327 audit(1747332222.102:549): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736343135613565666664653066663664613039353164346532613764 May 15 18:03:42.105000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.134210 kernel: audit: type=1400 audit(1747332222.105:550): avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.134260 kernel: audit: type=1400 audit(1747332222.105:550): avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.105000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.138898 kernel: audit: type=1400 audit(1747332222.105:550): avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.105000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.143765 kernel: audit: type=1400 audit(1747332222.105:550): avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.105000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.105000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.153066 kernel: audit: type=1400 audit(1747332222.105:550): avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.153217 kernel: audit: type=1400 audit(1747332222.105:550): avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.105000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.163615 kernel: audit: type=1400 audit(1747332222.105:550): avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.105000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.105000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.105000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.105000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.105000 audit: BPF prog-id=78 op=LOAD May 15 18:03:42.105000 audit[2109]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a8708 items=0 ppid=1595 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:42.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736343135613565666664653066663664613039353164346532613764 May 15 18:03:42.109000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.109000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.109000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.109000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.109000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.109000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.109000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.109000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.109000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.109000 audit: BPF prog-id=79 op=LOAD May 15 18:03:42.109000 audit[2109]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a8758 items=0 ppid=1595 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:42.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736343135613565666664653066663664613039353164346532613764 May 15 18:03:42.109000 audit: BPF prog-id=79 op=UNLOAD May 15 18:03:42.109000 audit: BPF prog-id=78 op=UNLOAD May 15 18:03:42.109000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.109000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.109000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.109000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.109000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.109000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.109000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.109000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.109000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.109000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:42.109000 audit: BPF prog-id=80 op=LOAD May 15 18:03:42.109000 audit[2109]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a87e8 items=0 ppid=1595 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:42.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736343135613565666664653066663664613039353164346532613764 May 15 18:03:42.171777 env[1157]: time="2025-05-15T18:03:42.171709587Z" level=info msg="StartContainer for \"76415a5effde0ff6da0951d4e2a7d04c4b048a318ef4ffc3ee30a3fab3d52c09\" returns successfully" May 15 18:03:42.305261 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 15 18:03:42.305491 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 15 18:03:42.522695 kubelet[1465]: E0515 18:03:42.522256 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:43.132031 kubelet[1465]: I0515 18:03:43.131862 1465 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-cpjp2" podStartSLOduration=4.5767592310000005 podStartE2EDuration="35.131747077s" podCreationTimestamp="2025-05-15 18:03:08 +0000 UTC" firstStartedPulling="2025-05-15 18:03:11.370494962 +0000 UTC m=+3.747552545" lastFinishedPulling="2025-05-15 18:03:41.925482757 +0000 UTC m=+34.302540391" observedRunningTime="2025-05-15 18:03:43.131273319 +0000 UTC m=+35.508330982" watchObservedRunningTime="2025-05-15 18:03:43.131747077 +0000 UTC m=+35.508804710" May 15 18:03:43.148540 systemd[1]: run-containerd-runc-k8s.io-76415a5effde0ff6da0951d4e2a7d04c4b048a318ef4ffc3ee30a3fab3d52c09-runc.arrcrY.mount: Deactivated successfully. May 15 18:03:43.522915 kubelet[1465]: E0515 18:03:43.522667 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:43.974000 audit[2226]: AVC avc: denied { write } for pid=2226 comm="tee" name="fd" dev="proc" ino=19073 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 18:03:43.974000 audit[2226]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe115f5a0b a2=241 a3=1b6 items=1 ppid=2196 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:43.974000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 18:03:43.974000 audit: PATH item=0 name="/dev/fd/63" inode=19062 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:03:43.974000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 18:03:43.983000 audit[2232]: AVC avc: denied { write } for pid=2232 comm="tee" name="fd" dev="proc" ino=19842 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 18:03:43.985000 audit[2229]: AVC avc: denied { write } for pid=2229 comm="tee" name="fd" dev="proc" ino=19846 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 18:03:43.983000 audit[2232]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5162da0a a2=241 a3=1b6 items=1 ppid=2207 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:43.983000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 18:03:43.983000 audit: PATH item=0 name="/dev/fd/63" inode=19077 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:03:43.983000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 18:03:43.985000 audit[2229]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffce7cae9fb a2=241 a3=1b6 items=1 ppid=2200 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:43.985000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 18:03:43.985000 audit: PATH item=0 name="/dev/fd/63" inode=19836 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:03:43.985000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 18:03:43.991000 audit[2240]: AVC avc: denied { write } for pid=2240 comm="tee" name="fd" dev="proc" ino=19855 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 18:03:43.991000 audit[2243]: AVC avc: denied { write } for pid=2243 comm="tee" name="fd" dev="proc" ino=19858 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 18:03:43.991000 audit[2243]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff43639a0a a2=241 a3=1b6 items=1 ppid=2204 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:43.991000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 18:03:43.991000 audit: PATH item=0 name="/dev/fd/63" inode=19837 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:03:43.991000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 18:03:43.991000 audit[2240]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe8ed49a0c a2=241 a3=1b6 items=1 ppid=2198 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:43.991000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 18:03:43.991000 audit: PATH item=0 name="/dev/fd/63" inode=19078 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:03:43.991000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 18:03:43.998000 audit[2252]: AVC avc: denied { write } for pid=2252 comm="tee" name="fd" dev="proc" ino=19083 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 18:03:43.998000 audit[2252]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc6feab9fa a2=241 a3=1b6 items=1 ppid=2199 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:43.998000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 18:03:43.998000 audit: PATH item=0 name="/dev/fd/63" inode=19843 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:03:43.998000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 18:03:44.008000 audit[2257]: AVC avc: denied { write } for pid=2257 comm="tee" name="fd" dev="proc" ino=19865 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 18:03:44.008000 audit[2257]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeaa2b9a0a a2=241 a3=1b6 items=1 ppid=2211 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.008000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 18:03:44.008000 audit: PATH item=0 name="/dev/fd/63" inode=19852 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:03:44.008000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 18:03:44.122264 systemd[1]: run-containerd-runc-k8s.io-76415a5effde0ff6da0951d4e2a7d04c4b048a318ef4ffc3ee30a3fab3d52c09-runc.rL0xWN.mount: Deactivated successfully. May 15 18:03:44.288000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.288000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.288000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.288000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.288000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.288000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.288000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.288000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.288000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.288000 audit: BPF prog-id=81 op=LOAD May 15 18:03:44.288000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff5774f00 a2=98 a3=3 items=0 ppid=2210 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.288000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 18:03:44.288000 audit: BPF prog-id=81 op=UNLOAD May 15 18:03:44.289000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.289000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.289000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.289000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.289000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.289000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.289000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.289000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.289000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.289000 audit: BPF prog-id=82 op=LOAD May 15 18:03:44.289000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffff5774ce0 a2=74 a3=540051 items=0 ppid=2210 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.289000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 18:03:44.290000 audit: BPF prog-id=82 op=UNLOAD May 15 18:03:44.290000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.290000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.290000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.290000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.290000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.290000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.290000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.290000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.290000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.290000 audit: BPF prog-id=83 op=LOAD May 15 18:03:44.290000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffff5774d10 a2=94 a3=2 items=0 ppid=2210 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.290000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 18:03:44.290000 audit: BPF prog-id=83 op=UNLOAD May 15 18:03:44.424000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.424000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.424000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.424000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.424000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.424000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.424000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.424000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.424000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.424000 audit: BPF prog-id=84 op=LOAD May 15 18:03:44.424000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffff5774bd0 a2=40 a3=1 items=0 ppid=2210 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.424000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 18:03:44.425000 audit: BPF prog-id=84 op=UNLOAD May 15 18:03:44.425000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.425000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffff5774ca0 a2=50 a3=7ffff5774d80 items=0 ppid=2210 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.425000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 18:03:44.436000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.436000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff5774be0 a2=28 a3=0 items=0 ppid=2210 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.436000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 18:03:44.437000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.437000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff5774c10 a2=28 a3=0 items=0 ppid=2210 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.437000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 18:03:44.437000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.437000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff5774b20 a2=28 a3=0 items=0 ppid=2210 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.437000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 18:03:44.437000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.437000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff5774c30 a2=28 a3=0 items=0 ppid=2210 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.437000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 18:03:44.438000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.438000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff5774c10 a2=28 a3=0 items=0 ppid=2210 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.438000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 18:03:44.438000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.438000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff5774c00 a2=28 a3=0 items=0 ppid=2210 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.438000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 18:03:44.438000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.438000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff5774c30 a2=28 a3=0 items=0 ppid=2210 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.438000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 18:03:44.438000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.438000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff5774c10 a2=28 a3=0 items=0 ppid=2210 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.438000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 18:03:44.438000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.438000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff5774c30 a2=28 a3=0 items=0 ppid=2210 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.438000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 18:03:44.438000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.438000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff5774c00 a2=28 a3=0 items=0 ppid=2210 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.438000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 18:03:44.438000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.438000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff5774c70 a2=28 a3=0 items=0 ppid=2210 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.438000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 18:03:44.439000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.439000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffff5774a20 a2=50 a3=1 items=0 ppid=2210 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.439000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 18:03:44.439000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.439000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.439000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.439000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.439000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.439000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.439000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.439000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.439000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.439000 audit: BPF prog-id=85 op=LOAD May 15 18:03:44.439000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffff5774a20 a2=94 a3=5 items=0 ppid=2210 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.439000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 18:03:44.439000 audit: BPF prog-id=85 op=UNLOAD May 15 18:03:44.439000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.439000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffff5774ad0 a2=50 a3=1 items=0 ppid=2210 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.439000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 18:03:44.439000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.439000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffff5774bf0 a2=4 a3=38 items=0 ppid=2210 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.439000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 18:03:44.439000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.439000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.439000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.439000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.439000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.439000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.439000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.439000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.439000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.439000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.439000 audit[2327]: AVC avc: denied { confidentiality } for pid=2327 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:03:44.439000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffff5774c40 a2=94 a3=6 items=0 ppid=2210 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.439000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 18:03:44.440000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.440000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.440000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.440000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.440000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.440000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.440000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.440000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.440000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.440000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.440000 audit[2327]: AVC avc: denied { confidentiality } for pid=2327 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:03:44.440000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffff57743f0 a2=94 a3=83 items=0 ppid=2210 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.440000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 18:03:44.441000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.441000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.441000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.441000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.441000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.441000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.441000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.441000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.441000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.441000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.441000 audit[2327]: AVC avc: denied { confidentiality } for pid=2327 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:03:44.441000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffff57743f0 a2=94 a3=83 items=0 ppid=2210 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.441000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 18:03:44.460000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit: BPF prog-id=86 op=LOAD May 15 18:03:44.460000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd6778c7a0 a2=98 a3=1999999999999999 items=0 ppid=2210 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.460000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 18:03:44.460000 audit: BPF prog-id=86 op=UNLOAD May 15 18:03:44.460000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit: BPF prog-id=87 op=LOAD May 15 18:03:44.460000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd6778c680 a2=74 a3=ffff items=0 ppid=2210 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.460000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 18:03:44.460000 audit: BPF prog-id=87 op=UNLOAD May 15 18:03:44.460000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.460000 audit: BPF prog-id=88 op=LOAD May 15 18:03:44.460000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd6778c6c0 a2=40 a3=7ffd6778c8a0 items=0 ppid=2210 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.460000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 18:03:44.461000 audit: BPF prog-id=88 op=UNLOAD May 15 18:03:44.523720 kubelet[1465]: E0515 18:03:44.523653 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:44.607152 systemd-networkd[982]: vxlan.calico: Link UP May 15 18:03:44.611581 systemd-networkd[982]: vxlan.calico: Gained carrier May 15 18:03:44.678000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.678000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.678000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.678000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.678000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.678000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.678000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.678000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.678000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.678000 audit: BPF prog-id=89 op=LOAD May 15 18:03:44.678000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0042ed30 a2=98 a3=100 items=0 ppid=2210 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.678000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 18:03:44.678000 audit: BPF prog-id=89 op=UNLOAD May 15 18:03:44.678000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.678000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.678000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.678000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.678000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.678000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.678000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.678000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.678000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.678000 audit: BPF prog-id=90 op=LOAD May 15 18:03:44.678000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0042eb40 a2=74 a3=540051 items=0 ppid=2210 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.678000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 18:03:44.679000 audit: BPF prog-id=90 op=UNLOAD May 15 18:03:44.679000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.679000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.679000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.679000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.679000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.679000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.679000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.679000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.679000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.679000 audit: BPF prog-id=91 op=LOAD May 15 18:03:44.679000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0042eb70 a2=94 a3=2 items=0 ppid=2210 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.679000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 18:03:44.679000 audit: BPF prog-id=91 op=UNLOAD May 15 18:03:44.679000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.679000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0042ea40 a2=28 a3=0 items=0 ppid=2210 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.679000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 18:03:44.679000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.679000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0042ea70 a2=28 a3=0 items=0 ppid=2210 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.679000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 18:03:44.679000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.679000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0042e980 a2=28 a3=0 items=0 ppid=2210 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.679000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 18:03:44.679000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.679000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0042ea90 a2=28 a3=0 items=0 ppid=2210 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.679000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 18:03:44.679000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.679000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0042ea70 a2=28 a3=0 items=0 ppid=2210 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.679000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 18:03:44.679000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.679000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0042ea60 a2=28 a3=0 items=0 ppid=2210 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.679000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 18:03:44.679000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.679000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0042ea90 a2=28 a3=0 items=0 ppid=2210 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.679000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 18:03:44.679000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.679000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0042ea70 a2=28 a3=0 items=0 ppid=2210 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.679000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 18:03:44.680000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.680000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0042ea90 a2=28 a3=0 items=0 ppid=2210 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.680000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 18:03:44.680000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.680000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0042ea60 a2=28 a3=0 items=0 ppid=2210 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.680000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 18:03:44.680000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.680000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0042ead0 a2=28 a3=0 items=0 ppid=2210 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.680000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 18:03:44.680000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.680000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.680000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.680000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.680000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.680000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.680000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.680000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.680000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.680000 audit: BPF prog-id=92 op=LOAD May 15 18:03:44.680000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff0042e940 a2=40 a3=0 items=0 ppid=2210 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.680000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 18:03:44.680000 audit: BPF prog-id=92 op=UNLOAD May 15 18:03:44.681000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.681000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff0042e930 a2=50 a3=2800 items=0 ppid=2210 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.681000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 18:03:44.681000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.681000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff0042e930 a2=50 a3=2800 items=0 ppid=2210 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.681000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 18:03:44.681000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.681000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.681000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.681000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.681000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.681000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.681000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.681000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.681000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.681000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.681000 audit: BPF prog-id=93 op=LOAD May 15 18:03:44.681000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff0042e150 a2=94 a3=2 items=0 ppid=2210 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.681000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 18:03:44.682000 audit: BPF prog-id=93 op=UNLOAD May 15 18:03:44.682000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.682000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.682000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.682000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.682000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.682000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.682000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.682000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.682000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.682000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.682000 audit: BPF prog-id=94 op=LOAD May 15 18:03:44.682000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff0042e250 a2=94 a3=30 items=0 ppid=2210 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.682000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit: BPF prog-id=95 op=LOAD May 15 18:03:44.697000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe48c6f660 a2=98 a3=0 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.697000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.697000 audit: BPF prog-id=95 op=UNLOAD May 15 18:03:44.697000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit: BPF prog-id=96 op=LOAD May 15 18:03:44.697000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe48c6f440 a2=74 a3=540051 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.697000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.697000 audit: BPF prog-id=96 op=UNLOAD May 15 18:03:44.697000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.697000 audit: BPF prog-id=97 op=LOAD May 15 18:03:44.697000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe48c6f470 a2=94 a3=2 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.697000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.697000 audit: BPF prog-id=97 op=UNLOAD May 15 18:03:44.829000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.829000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.829000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.829000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.829000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.829000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.829000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.829000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.829000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.829000 audit: BPF prog-id=98 op=LOAD May 15 18:03:44.829000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe48c6f330 a2=40 a3=1 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.829000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.830000 audit: BPF prog-id=98 op=UNLOAD May 15 18:03:44.830000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.830000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe48c6f400 a2=50 a3=7ffe48c6f4e0 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.830000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.840000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.840000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe48c6f340 a2=28 a3=0 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.840000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.840000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.840000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe48c6f370 a2=28 a3=0 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.840000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.840000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.840000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe48c6f280 a2=28 a3=0 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.840000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.840000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.840000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe48c6f390 a2=28 a3=0 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.840000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.840000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.840000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe48c6f370 a2=28 a3=0 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.840000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.840000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.840000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe48c6f360 a2=28 a3=0 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.840000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.840000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.840000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe48c6f390 a2=28 a3=0 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.840000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.840000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.840000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe48c6f370 a2=28 a3=0 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.840000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.840000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.840000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe48c6f390 a2=28 a3=0 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.840000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.840000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.840000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe48c6f360 a2=28 a3=0 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.840000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.840000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.840000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe48c6f3d0 a2=28 a3=0 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.840000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe48c6f180 a2=50 a3=1 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.841000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit: BPF prog-id=99 op=LOAD May 15 18:03:44.841000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe48c6f180 a2=94 a3=5 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.841000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.841000 audit: BPF prog-id=99 op=UNLOAD May 15 18:03:44.841000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe48c6f230 a2=50 a3=1 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.841000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe48c6f350 a2=4 a3=38 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.841000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { confidentiality } for pid=2364 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:03:44.841000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe48c6f3a0 a2=94 a3=6 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.841000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.841000 audit[2364]: AVC avc: denied { confidentiality } for pid=2364 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:03:44.841000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe48c6eb50 a2=94 a3=83 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.841000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.842000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.842000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.842000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.842000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.842000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.842000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.842000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.842000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.842000 audit[2364]: AVC avc: denied { perfmon } for pid=2364 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.842000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.842000 audit[2364]: AVC avc: denied { confidentiality } for pid=2364 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:03:44.842000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe48c6eb50 a2=94 a3=83 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.842000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.843000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.843000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe48c70590 a2=10 a3=f0f1 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.843000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.843000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.843000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe48c70430 a2=10 a3=3 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.843000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.843000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.843000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe48c703d0 a2=10 a3=3 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.843000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.843000 audit[2364]: AVC avc: denied { bpf } for pid=2364 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:44.843000 audit[2364]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe48c703d0 a2=10 a3=7 items=0 ppid=2210 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.843000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 18:03:44.851000 audit: BPF prog-id=94 op=UNLOAD May 15 18:03:44.851000 audit[1116]: SYSCALL arch=c000003e syscall=257 success=yes exit=20 a0=ffffff9c a1=5582a202dc20 a2=80002 a3=0 items=1 ppid=1 pid=1116 auid=4294967295 uid=245 gid=245 euid=245 suid=245 fsuid=245 egid=245 sgid=245 fsgid=245 tty=(none) ses=4294967295 comm="systemd-resolve" exe="/usr/lib/systemd/systemd-resolved" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:44.851000 audit: CWD cwd="/" May 15 18:03:44.851000 audit: PATH item=0 name="/proc/thread-self/attr/fscreate" inode=14682 dev=00:35 mode=0100666 ouid=245 ogid=245 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:03:44.851000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-resolved" May 15 18:03:45.102000 audit[2387]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 18:03:45.102000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe92bfbee0 a2=0 a3=7ffe92bfbecc items=0 ppid=2210 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:45.102000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 18:03:45.126000 audit[2391]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 18:03:45.126000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe022391a0 a2=0 a3=7ffe0223918c items=0 ppid=2210 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:45.126000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 18:03:45.130000 audit[2390]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 18:03:45.130000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc5868dfa0 a2=0 a3=7ffc5868df8c items=0 ppid=2210 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:45.130000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 18:03:45.133000 audit[2386]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 18:03:45.133000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc575a0a20 a2=0 a3=7ffc575a0a0c items=0 ppid=2210 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:45.133000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 18:03:45.524935 kubelet[1465]: E0515 18:03:45.524701 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:45.690449 systemd-networkd[982]: vxlan.calico: Gained IPv6LL May 15 18:03:46.526179 kubelet[1465]: E0515 18:03:46.526023 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:47.528881 kubelet[1465]: E0515 18:03:47.528805 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:48.480098 kubelet[1465]: E0515 18:03:48.479925 1465 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:48.530605 kubelet[1465]: E0515 18:03:48.530457 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:49.156130 systemd[1]: run-containerd-runc-k8s.io-76415a5effde0ff6da0951d4e2a7d04c4b048a318ef4ffc3ee30a3fab3d52c09-runc.Si4mVl.mount: Deactivated successfully. May 15 18:03:49.531899 kubelet[1465]: E0515 18:03:49.531692 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:49.823821 env[1157]: time="2025-05-15T18:03:49.822909213Z" level=info msg="StopPodSandbox for \"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a\"" May 15 18:03:50.052859 env[1157]: 2025-05-15 18:03:49.961 [INFO][2434] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" May 15 18:03:50.052859 env[1157]: 2025-05-15 18:03:49.962 [INFO][2434] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" iface="eth0" netns="/var/run/netns/cni-06dc898e-90de-1eab-d29c-d11ac64d610f" May 15 18:03:50.052859 env[1157]: 2025-05-15 18:03:49.962 [INFO][2434] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" iface="eth0" netns="/var/run/netns/cni-06dc898e-90de-1eab-d29c-d11ac64d610f" May 15 18:03:50.052859 env[1157]: 2025-05-15 18:03:49.963 [INFO][2434] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" iface="eth0" netns="/var/run/netns/cni-06dc898e-90de-1eab-d29c-d11ac64d610f" May 15 18:03:50.052859 env[1157]: 2025-05-15 18:03:49.963 [INFO][2434] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" May 15 18:03:50.052859 env[1157]: 2025-05-15 18:03:49.963 [INFO][2434] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" May 15 18:03:50.052859 env[1157]: 2025-05-15 18:03:50.016 [INFO][2441] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" HandleID="k8s-pod-network.1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" Workload="172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0" May 15 18:03:50.052859 env[1157]: 2025-05-15 18:03:50.016 [INFO][2441] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 18:03:50.052859 env[1157]: 2025-05-15 18:03:50.016 [INFO][2441] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 18:03:50.052859 env[1157]: 2025-05-15 18:03:50.038 [WARNING][2441] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" HandleID="k8s-pod-network.1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" Workload="172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0" May 15 18:03:50.052859 env[1157]: 2025-05-15 18:03:50.039 [INFO][2441] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" HandleID="k8s-pod-network.1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" Workload="172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0" May 15 18:03:50.052859 env[1157]: 2025-05-15 18:03:50.044 [INFO][2441] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 18:03:50.052859 env[1157]: 2025-05-15 18:03:50.049 [INFO][2434] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" May 15 18:03:50.062326 env[1157]: time="2025-05-15T18:03:50.058289192Z" level=info msg="TearDown network for sandbox \"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a\" successfully" May 15 18:03:50.062326 env[1157]: time="2025-05-15T18:03:50.058840176Z" level=info msg="StopPodSandbox for \"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a\" returns successfully" May 15 18:03:50.065670 systemd[1]: run-netns-cni\x2d06dc898e\x2d90de\x2d1eab\x2dd29c\x2dd11ac64d610f.mount: Deactivated successfully. May 15 18:03:50.075919 env[1157]: time="2025-05-15T18:03:50.071540910Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-w6x7g,Uid:4d6c7e15-9489-4d73-8950-20545cf971db,Namespace:default,Attempt:1,}" May 15 18:03:50.396455 systemd-networkd[982]: cali63f1c30e9d1: Link UP May 15 18:03:50.402439 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 18:03:50.402956 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali63f1c30e9d1: link becomes ready May 15 18:03:50.407389 systemd-networkd[982]: cali63f1c30e9d1: Gained carrier May 15 18:03:50.444013 env[1157]: 2025-05-15 18:03:50.208 [INFO][2450] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0 nginx-deployment-85f456d6dd- default 4d6c7e15-9489-4d73-8950-20545cf971db 1479 0 2025-05-15 18:03:35 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.194 nginx-deployment-85f456d6dd-w6x7g eth0 default [] [] [kns.default ksa.default.default] cali63f1c30e9d1 [] []}} ContainerID="529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09" Namespace="default" Pod="nginx-deployment-85f456d6dd-w6x7g" WorkloadEndpoint="172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-" May 15 18:03:50.444013 env[1157]: 2025-05-15 18:03:50.209 [INFO][2450] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09" Namespace="default" Pod="nginx-deployment-85f456d6dd-w6x7g" WorkloadEndpoint="172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0" May 15 18:03:50.444013 env[1157]: 2025-05-15 18:03:50.249 [INFO][2468] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09" HandleID="k8s-pod-network.529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09" Workload="172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0" May 15 18:03:50.444013 env[1157]: 2025-05-15 18:03:50.274 [INFO][2468] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09" HandleID="k8s-pod-network.529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09" Workload="172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031a7a0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.194", "pod":"nginx-deployment-85f456d6dd-w6x7g", "timestamp":"2025-05-15 18:03:50.249265148 +0000 UTC"}, Hostname:"172.24.4.194", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 18:03:50.444013 env[1157]: 2025-05-15 18:03:50.275 [INFO][2468] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 18:03:50.444013 env[1157]: 2025-05-15 18:03:50.275 [INFO][2468] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 18:03:50.444013 env[1157]: 2025-05-15 18:03:50.275 [INFO][2468] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.194' May 15 18:03:50.444013 env[1157]: 2025-05-15 18:03:50.281 [INFO][2468] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09" host="172.24.4.194" May 15 18:03:50.444013 env[1157]: 2025-05-15 18:03:50.292 [INFO][2468] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.194" May 15 18:03:50.444013 env[1157]: 2025-05-15 18:03:50.306 [INFO][2468] ipam/ipam.go 489: Trying affinity for 192.168.74.128/26 host="172.24.4.194" May 15 18:03:50.444013 env[1157]: 2025-05-15 18:03:50.312 [INFO][2468] ipam/ipam.go 155: Attempting to load block cidr=192.168.74.128/26 host="172.24.4.194" May 15 18:03:50.444013 env[1157]: 2025-05-15 18:03:50.319 [INFO][2468] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.74.128/26 host="172.24.4.194" May 15 18:03:50.444013 env[1157]: 2025-05-15 18:03:50.319 [INFO][2468] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.74.128/26 handle="k8s-pod-network.529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09" host="172.24.4.194" May 15 18:03:50.444013 env[1157]: 2025-05-15 18:03:50.324 [INFO][2468] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09 May 15 18:03:50.444013 env[1157]: 2025-05-15 18:03:50.339 [INFO][2468] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.74.128/26 handle="k8s-pod-network.529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09" host="172.24.4.194" May 15 18:03:50.444013 env[1157]: 2025-05-15 18:03:50.364 [INFO][2468] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.74.129/26] block=192.168.74.128/26 handle="k8s-pod-network.529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09" host="172.24.4.194" May 15 18:03:50.444013 env[1157]: 2025-05-15 18:03:50.364 [INFO][2468] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.74.129/26] handle="k8s-pod-network.529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09" host="172.24.4.194" May 15 18:03:50.444013 env[1157]: 2025-05-15 18:03:50.364 [INFO][2468] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 18:03:50.444013 env[1157]: 2025-05-15 18:03:50.364 [INFO][2468] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.74.129/26] IPv6=[] ContainerID="529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09" HandleID="k8s-pod-network.529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09" Workload="172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0" May 15 18:03:50.446766 env[1157]: 2025-05-15 18:03:50.369 [INFO][2450] cni-plugin/k8s.go 386: Populated endpoint ContainerID="529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09" Namespace="default" Pod="nginx-deployment-85f456d6dd-w6x7g" WorkloadEndpoint="172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"4d6c7e15-9489-4d73-8950-20545cf971db", ResourceVersion:"1479", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 18, 3, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.194", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-w6x7g", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.74.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali63f1c30e9d1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 18:03:50.446766 env[1157]: 2025-05-15 18:03:50.369 [INFO][2450] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.74.129/32] ContainerID="529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09" Namespace="default" Pod="nginx-deployment-85f456d6dd-w6x7g" WorkloadEndpoint="172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0" May 15 18:03:50.446766 env[1157]: 2025-05-15 18:03:50.369 [INFO][2450] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali63f1c30e9d1 ContainerID="529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09" Namespace="default" Pod="nginx-deployment-85f456d6dd-w6x7g" WorkloadEndpoint="172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0" May 15 18:03:50.446766 env[1157]: 2025-05-15 18:03:50.409 [INFO][2450] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09" Namespace="default" Pod="nginx-deployment-85f456d6dd-w6x7g" WorkloadEndpoint="172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0" May 15 18:03:50.446766 env[1157]: 2025-05-15 18:03:50.410 [INFO][2450] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09" Namespace="default" Pod="nginx-deployment-85f456d6dd-w6x7g" WorkloadEndpoint="172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"4d6c7e15-9489-4d73-8950-20545cf971db", ResourceVersion:"1479", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 18, 3, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.194", ContainerID:"529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09", Pod:"nginx-deployment-85f456d6dd-w6x7g", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.74.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali63f1c30e9d1", MAC:"22:e1:ed:81:d5:27", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 18:03:50.446766 env[1157]: 2025-05-15 18:03:50.422 [INFO][2450] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09" Namespace="default" Pod="nginx-deployment-85f456d6dd-w6x7g" WorkloadEndpoint="172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0" May 15 18:03:50.462000 audit[2491]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=2491 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 18:03:50.467069 kernel: kauditd_printk_skb: 552 callbacks suppressed May 15 18:03:50.467288 kernel: audit: type=1325 audit(1747332230.462:657): table=filter:69 family=2 entries=34 op=nft_register_chain pid=2491 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 18:03:50.462000 audit[2491]: SYSCALL arch=c000003e syscall=46 success=yes exit=19124 a0=3 a1=7fff99c74410 a2=0 a3=7fff99c743fc items=0 ppid=2210 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:50.477232 kernel: audit: type=1300 audit(1747332230.462:657): arch=c000003e syscall=46 success=yes exit=19124 a0=3 a1=7fff99c74410 a2=0 a3=7fff99c743fc items=0 ppid=2210 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:50.462000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 18:03:50.482937 env[1157]: time="2025-05-15T18:03:50.482178790Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 18:03:50.482937 env[1157]: time="2025-05-15T18:03:50.482244424Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 18:03:50.482937 env[1157]: time="2025-05-15T18:03:50.482257478Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 18:03:50.482937 env[1157]: time="2025-05-15T18:03:50.482451486Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09 pid=2498 runtime=io.containerd.runc.v2 May 15 18:03:50.483627 kernel: audit: type=1327 audit(1747332230.462:657): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 18:03:50.511860 systemd[1]: run-containerd-runc-k8s.io-529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09-runc.I97qWY.mount: Deactivated successfully. May 15 18:03:50.516826 systemd[1]: Started cri-containerd-529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09.scope. May 15 18:03:50.533858 kubelet[1465]: E0515 18:03:50.533796 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:50.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.545849 kernel: audit: type=1400 audit(1747332230.534:658): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.545934 kernel: audit: type=1400 audit(1747332230.534:659): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.545982 kernel: audit: type=1400 audit(1747332230.534:660): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.555380 kernel: audit: type=1400 audit(1747332230.534:661): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.555479 kernel: audit: type=1400 audit(1747332230.534:662): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.565185 kernel: audit: type=1400 audit(1747332230.534:663): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.565294 kernel: audit: type=1400 audit(1747332230.534:664): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.534000 audit: BPF prog-id=100 op=LOAD May 15 18:03:50.541000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.541000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2498 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:50.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532396266393539333531326161613430313863646463356332306533 May 15 18:03:50.541000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.541000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2498 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:50.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532396266393539333531326161613430313863646463356332306533 May 15 18:03:50.541000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.541000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.541000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.541000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.541000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.541000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.541000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.541000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.541000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.541000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.541000 audit: BPF prog-id=101 op=LOAD May 15 18:03:50.541000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003ce820 items=0 ppid=2498 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:50.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532396266393539333531326161613430313863646463356332306533 May 15 18:03:50.549000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.549000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.549000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.549000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.549000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.549000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.549000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.549000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.549000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.549000 audit: BPF prog-id=102 op=LOAD May 15 18:03:50.549000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003ce868 items=0 ppid=2498 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:50.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532396266393539333531326161613430313863646463356332306533 May 15 18:03:50.558000 audit: BPF prog-id=102 op=UNLOAD May 15 18:03:50.558000 audit: BPF prog-id=101 op=UNLOAD May 15 18:03:50.559000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.559000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.559000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.559000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.559000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.559000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.559000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.559000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.559000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.559000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:50.559000 audit: BPF prog-id=103 op=LOAD May 15 18:03:50.559000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003cec78 items=0 ppid=2498 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:50.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532396266393539333531326161613430313863646463356332306533 May 15 18:03:50.604613 env[1157]: time="2025-05-15T18:03:50.604499400Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-w6x7g,Uid:4d6c7e15-9489-4d73-8950-20545cf971db,Namespace:default,Attempt:1,} returns sandbox id \"529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09\"" May 15 18:03:50.607682 env[1157]: time="2025-05-15T18:03:50.607634397Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 15 18:03:51.534042 kubelet[1465]: E0515 18:03:51.533943 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:51.642386 systemd-networkd[982]: cali63f1c30e9d1: Gained IPv6LL May 15 18:03:52.534497 kubelet[1465]: E0515 18:03:52.534409 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:53.534852 kubelet[1465]: E0515 18:03:53.534717 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:53.824253 env[1157]: time="2025-05-15T18:03:53.824198176Z" level=info msg="StopPodSandbox for \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\"" May 15 18:03:53.999684 env[1157]: 2025-05-15 18:03:53.916 [INFO][2548] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" May 15 18:03:53.999684 env[1157]: 2025-05-15 18:03:53.916 [INFO][2548] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" iface="eth0" netns="/var/run/netns/cni-762a845f-5552-c1e6-1712-cf2cf260d781" May 15 18:03:53.999684 env[1157]: 2025-05-15 18:03:53.917 [INFO][2548] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" iface="eth0" netns="/var/run/netns/cni-762a845f-5552-c1e6-1712-cf2cf260d781" May 15 18:03:53.999684 env[1157]: 2025-05-15 18:03:53.920 [INFO][2548] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" iface="eth0" netns="/var/run/netns/cni-762a845f-5552-c1e6-1712-cf2cf260d781" May 15 18:03:53.999684 env[1157]: 2025-05-15 18:03:53.920 [INFO][2548] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" May 15 18:03:53.999684 env[1157]: 2025-05-15 18:03:53.920 [INFO][2548] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" May 15 18:03:53.999684 env[1157]: 2025-05-15 18:03:53.982 [INFO][2555] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" HandleID="k8s-pod-network.1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" Workload="172.24.4.194-k8s-csi--node--driver--rnqf2-eth0" May 15 18:03:53.999684 env[1157]: 2025-05-15 18:03:53.982 [INFO][2555] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 18:03:53.999684 env[1157]: 2025-05-15 18:03:53.982 [INFO][2555] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 18:03:53.999684 env[1157]: 2025-05-15 18:03:53.994 [WARNING][2555] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" HandleID="k8s-pod-network.1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" Workload="172.24.4.194-k8s-csi--node--driver--rnqf2-eth0" May 15 18:03:53.999684 env[1157]: 2025-05-15 18:03:53.994 [INFO][2555] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" HandleID="k8s-pod-network.1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" Workload="172.24.4.194-k8s-csi--node--driver--rnqf2-eth0" May 15 18:03:53.999684 env[1157]: 2025-05-15 18:03:53.997 [INFO][2555] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 18:03:53.999684 env[1157]: 2025-05-15 18:03:53.998 [INFO][2548] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" May 15 18:03:54.003324 env[1157]: time="2025-05-15T18:03:54.002159058Z" level=info msg="TearDown network for sandbox \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\" successfully" May 15 18:03:54.003324 env[1157]: time="2025-05-15T18:03:54.002203403Z" level=info msg="StopPodSandbox for \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\" returns successfully" May 15 18:03:54.002013 systemd[1]: run-netns-cni\x2d762a845f\x2d5552\x2dc1e6\x2d1712\x2dcf2cf260d781.mount: Deactivated successfully. May 15 18:03:54.004383 env[1157]: time="2025-05-15T18:03:54.004342189Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rnqf2,Uid:c728858b-b0dc-4cc7-831f-32aa358609d7,Namespace:calico-system,Attempt:1,}" May 15 18:03:54.209462 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 18:03:54.209731 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2d7cd9175a6: link becomes ready May 15 18:03:54.211795 systemd-networkd[982]: cali2d7cd9175a6: Link UP May 15 18:03:54.211978 systemd-networkd[982]: cali2d7cd9175a6: Gained carrier May 15 18:03:54.227127 env[1157]: 2025-05-15 18:03:54.099 [INFO][2561] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.194-k8s-csi--node--driver--rnqf2-eth0 csi-node-driver- calico-system c728858b-b0dc-4cc7-831f-32aa358609d7 1496 0 2025-05-15 18:03:08 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.24.4.194 csi-node-driver-rnqf2 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali2d7cd9175a6 [] []}} ContainerID="4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873" Namespace="calico-system" Pod="csi-node-driver-rnqf2" WorkloadEndpoint="172.24.4.194-k8s-csi--node--driver--rnqf2-" May 15 18:03:54.227127 env[1157]: 2025-05-15 18:03:54.099 [INFO][2561] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873" Namespace="calico-system" Pod="csi-node-driver-rnqf2" WorkloadEndpoint="172.24.4.194-k8s-csi--node--driver--rnqf2-eth0" May 15 18:03:54.227127 env[1157]: 2025-05-15 18:03:54.135 [INFO][2573] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873" HandleID="k8s-pod-network.4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873" Workload="172.24.4.194-k8s-csi--node--driver--rnqf2-eth0" May 15 18:03:54.227127 env[1157]: 2025-05-15 18:03:54.148 [INFO][2573] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873" HandleID="k8s-pod-network.4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873" Workload="172.24.4.194-k8s-csi--node--driver--rnqf2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002dd030), Attrs:map[string]string{"namespace":"calico-system", "node":"172.24.4.194", "pod":"csi-node-driver-rnqf2", "timestamp":"2025-05-15 18:03:54.135747609 +0000 UTC"}, Hostname:"172.24.4.194", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 18:03:54.227127 env[1157]: 2025-05-15 18:03:54.148 [INFO][2573] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 18:03:54.227127 env[1157]: 2025-05-15 18:03:54.148 [INFO][2573] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 18:03:54.227127 env[1157]: 2025-05-15 18:03:54.148 [INFO][2573] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.194' May 15 18:03:54.227127 env[1157]: 2025-05-15 18:03:54.154 [INFO][2573] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873" host="172.24.4.194" May 15 18:03:54.227127 env[1157]: 2025-05-15 18:03:54.160 [INFO][2573] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.194" May 15 18:03:54.227127 env[1157]: 2025-05-15 18:03:54.167 [INFO][2573] ipam/ipam.go 489: Trying affinity for 192.168.74.128/26 host="172.24.4.194" May 15 18:03:54.227127 env[1157]: 2025-05-15 18:03:54.170 [INFO][2573] ipam/ipam.go 155: Attempting to load block cidr=192.168.74.128/26 host="172.24.4.194" May 15 18:03:54.227127 env[1157]: 2025-05-15 18:03:54.175 [INFO][2573] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.74.128/26 host="172.24.4.194" May 15 18:03:54.227127 env[1157]: 2025-05-15 18:03:54.175 [INFO][2573] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.74.128/26 handle="k8s-pod-network.4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873" host="172.24.4.194" May 15 18:03:54.227127 env[1157]: 2025-05-15 18:03:54.178 [INFO][2573] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873 May 15 18:03:54.227127 env[1157]: 2025-05-15 18:03:54.184 [INFO][2573] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.74.128/26 handle="k8s-pod-network.4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873" host="172.24.4.194" May 15 18:03:54.227127 env[1157]: 2025-05-15 18:03:54.196 [INFO][2573] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.74.130/26] block=192.168.74.128/26 handle="k8s-pod-network.4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873" host="172.24.4.194" May 15 18:03:54.227127 env[1157]: 2025-05-15 18:03:54.196 [INFO][2573] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.74.130/26] handle="k8s-pod-network.4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873" host="172.24.4.194" May 15 18:03:54.227127 env[1157]: 2025-05-15 18:03:54.196 [INFO][2573] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 18:03:54.227127 env[1157]: 2025-05-15 18:03:54.197 [INFO][2573] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.74.130/26] IPv6=[] ContainerID="4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873" HandleID="k8s-pod-network.4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873" Workload="172.24.4.194-k8s-csi--node--driver--rnqf2-eth0" May 15 18:03:54.228070 env[1157]: 2025-05-15 18:03:54.198 [INFO][2561] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873" Namespace="calico-system" Pod="csi-node-driver-rnqf2" WorkloadEndpoint="172.24.4.194-k8s-csi--node--driver--rnqf2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.194-k8s-csi--node--driver--rnqf2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c728858b-b0dc-4cc7-831f-32aa358609d7", ResourceVersion:"1496", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 18, 3, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.194", ContainerID:"", Pod:"csi-node-driver-rnqf2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.74.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2d7cd9175a6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 18:03:54.228070 env[1157]: 2025-05-15 18:03:54.198 [INFO][2561] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.74.130/32] ContainerID="4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873" Namespace="calico-system" Pod="csi-node-driver-rnqf2" WorkloadEndpoint="172.24.4.194-k8s-csi--node--driver--rnqf2-eth0" May 15 18:03:54.228070 env[1157]: 2025-05-15 18:03:54.198 [INFO][2561] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2d7cd9175a6 ContainerID="4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873" Namespace="calico-system" Pod="csi-node-driver-rnqf2" WorkloadEndpoint="172.24.4.194-k8s-csi--node--driver--rnqf2-eth0" May 15 18:03:54.228070 env[1157]: 2025-05-15 18:03:54.209 [INFO][2561] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873" Namespace="calico-system" Pod="csi-node-driver-rnqf2" WorkloadEndpoint="172.24.4.194-k8s-csi--node--driver--rnqf2-eth0" May 15 18:03:54.228070 env[1157]: 2025-05-15 18:03:54.209 [INFO][2561] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873" Namespace="calico-system" Pod="csi-node-driver-rnqf2" WorkloadEndpoint="172.24.4.194-k8s-csi--node--driver--rnqf2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.194-k8s-csi--node--driver--rnqf2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c728858b-b0dc-4cc7-831f-32aa358609d7", ResourceVersion:"1496", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 18, 3, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.194", ContainerID:"4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873", Pod:"csi-node-driver-rnqf2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.74.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2d7cd9175a6", MAC:"12:a5:5c:1e:ce:4d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 18:03:54.228070 env[1157]: 2025-05-15 18:03:54.224 [INFO][2561] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873" Namespace="calico-system" Pod="csi-node-driver-rnqf2" WorkloadEndpoint="172.24.4.194-k8s-csi--node--driver--rnqf2-eth0" May 15 18:03:54.245000 audit[2590]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=2590 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 18:03:54.245000 audit[2590]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fff0023f3c0 a2=0 a3=7fff0023f3ac items=0 ppid=2210 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:54.245000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 18:03:54.274929 env[1157]: time="2025-05-15T18:03:54.274850602Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 18:03:54.274929 env[1157]: time="2025-05-15T18:03:54.274893293Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 18:03:54.275222 env[1157]: time="2025-05-15T18:03:54.275180326Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 18:03:54.275459 env[1157]: time="2025-05-15T18:03:54.275411843Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873 pid=2601 runtime=io.containerd.runc.v2 May 15 18:03:54.305822 systemd[1]: run-containerd-runc-k8s.io-4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873-runc.5okAXW.mount: Deactivated successfully. May 15 18:03:54.315788 systemd[1]: Started cri-containerd-4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873.scope. May 15 18:03:54.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.331000 audit: BPF prog-id=104 op=LOAD May 15 18:03:54.332000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.332000 audit[2612]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2601 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:54.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466333761353332323739356639383136626161643466383437646365 May 15 18:03:54.333000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.333000 audit[2612]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2601 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:54.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466333761353332323739356639383136626161643466383437646365 May 15 18:03:54.333000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.333000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.333000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.333000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.333000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.333000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.333000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.333000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.333000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.333000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.333000 audit: BPF prog-id=105 op=LOAD May 15 18:03:54.333000 audit[2612]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002dbff0 items=0 ppid=2601 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:54.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466333761353332323739356639383136626161643466383437646365 May 15 18:03:54.335000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.335000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.335000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.335000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.335000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.335000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.335000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.335000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.335000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.335000 audit: BPF prog-id=106 op=LOAD May 15 18:03:54.335000 audit[2612]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003c2038 items=0 ppid=2601 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:54.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466333761353332323739356639383136626161643466383437646365 May 15 18:03:54.336000 audit: BPF prog-id=106 op=UNLOAD May 15 18:03:54.336000 audit: BPF prog-id=105 op=UNLOAD May 15 18:03:54.336000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.336000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.336000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.336000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.336000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.336000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.336000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.336000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.336000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.336000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:54.336000 audit: BPF prog-id=107 op=LOAD May 15 18:03:54.336000 audit[2612]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003c2448 items=0 ppid=2601 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:54.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466333761353332323739356639383136626161643466383437646365 May 15 18:03:54.356762 env[1157]: time="2025-05-15T18:03:54.356709836Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rnqf2,Uid:c728858b-b0dc-4cc7-831f-32aa358609d7,Namespace:calico-system,Attempt:1,} returns sandbox id \"4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873\"" May 15 18:03:54.541926 kubelet[1465]: E0515 18:03:54.535268 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:55.028177 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2184577619.mount: Deactivated successfully. May 15 18:03:55.535629 kubelet[1465]: E0515 18:03:55.535469 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:56.187693 systemd-networkd[982]: cali2d7cd9175a6: Gained IPv6LL May 15 18:03:56.536015 kubelet[1465]: E0515 18:03:56.535772 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:57.224138 env[1157]: time="2025-05-15T18:03:57.224007048Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:57.228745 env[1157]: time="2025-05-15T18:03:57.228643325Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:57.234426 env[1157]: time="2025-05-15T18:03:57.234346770Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:57.239425 env[1157]: time="2025-05-15T18:03:57.239365890Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:57.242023 env[1157]: time="2025-05-15T18:03:57.241937662Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 15 18:03:57.249936 env[1157]: time="2025-05-15T18:03:57.249657329Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 15 18:03:57.253187 env[1157]: time="2025-05-15T18:03:57.252669816Z" level=info msg="CreateContainer within sandbox \"529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 15 18:03:57.297447 env[1157]: time="2025-05-15T18:03:57.297265971Z" level=info msg="CreateContainer within sandbox \"529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"052178af82ac6c4a960aecba597e72f75a363e2862db38c94ece40865da16f53\"" May 15 18:03:57.299968 env[1157]: time="2025-05-15T18:03:57.299900483Z" level=info msg="StartContainer for \"052178af82ac6c4a960aecba597e72f75a363e2862db38c94ece40865da16f53\"" May 15 18:03:57.356483 systemd[1]: run-containerd-runc-k8s.io-052178af82ac6c4a960aecba597e72f75a363e2862db38c94ece40865da16f53-runc.N4HFgG.mount: Deactivated successfully. May 15 18:03:57.362564 systemd[1]: Started cri-containerd-052178af82ac6c4a960aecba597e72f75a363e2862db38c94ece40865da16f53.scope. May 15 18:03:57.382569 kernel: kauditd_printk_skb: 110 callbacks suppressed May 15 18:03:57.382704 kernel: audit: type=1400 audit(1747332237.375:695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.382734 kernel: audit: type=1400 audit(1747332237.375:696): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.396425 kernel: audit: type=1400 audit(1747332237.375:697): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.396473 kernel: audit: type=1400 audit(1747332237.375:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.396516 kernel: audit: type=1400 audit(1747332237.375:699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.405730 kernel: audit: type=1400 audit(1747332237.375:700): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.405817 kernel: audit: type=1400 audit(1747332237.375:701): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.419877 kernel: audit: type=1400 audit(1747332237.375:702): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.419925 kernel: audit: type=1400 audit(1747332237.375:703): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.425564 kernel: audit: type=1400 audit(1747332237.381:704): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.381000 audit: BPF prog-id=108 op=LOAD May 15 18:03:57.385000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2498 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:57.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035323137386166383261633663346139363061656362613539376537 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2498 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:57.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035323137386166383261633663346139363061656362613539376537 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit: BPF prog-id=109 op=LOAD May 15 18:03:57.385000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00023aa90 items=0 ppid=2498 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:57.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035323137386166383261633663346139363061656362613539376537 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit: BPF prog-id=110 op=LOAD May 15 18:03:57.385000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00023aad8 items=0 ppid=2498 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:57.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035323137386166383261633663346139363061656362613539376537 May 15 18:03:57.385000 audit: BPF prog-id=110 op=UNLOAD May 15 18:03:57.385000 audit: BPF prog-id=109 op=UNLOAD May 15 18:03:57.385000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:57.385000 audit: BPF prog-id=111 op=LOAD May 15 18:03:57.385000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00023aee8 items=0 ppid=2498 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:57.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035323137386166383261633663346139363061656362613539376537 May 15 18:03:57.446665 env[1157]: time="2025-05-15T18:03:57.446605984Z" level=info msg="StartContainer for \"052178af82ac6c4a960aecba597e72f75a363e2862db38c94ece40865da16f53\" returns successfully" May 15 18:03:57.537021 kubelet[1465]: E0515 18:03:57.536852 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:58.537140 kubelet[1465]: E0515 18:03:58.537075 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:59.538085 kubelet[1465]: E0515 18:03:59.537994 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:03:59.796362 env[1157]: time="2025-05-15T18:03:59.795801997Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:59.800215 env[1157]: time="2025-05-15T18:03:59.800162459Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:59.803620 env[1157]: time="2025-05-15T18:03:59.803567716Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:59.806299 env[1157]: time="2025-05-15T18:03:59.806241219Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:03:59.806847 env[1157]: time="2025-05-15T18:03:59.806806578Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 15 18:03:59.810418 env[1157]: time="2025-05-15T18:03:59.810353653Z" level=info msg="CreateContainer within sandbox \"4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 15 18:03:59.836881 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2221906223.mount: Deactivated successfully. May 15 18:03:59.839909 env[1157]: time="2025-05-15T18:03:59.839836238Z" level=info msg="CreateContainer within sandbox \"4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"b6c175c5350116428a2a24b84b2153898221f1d4e2d5f655edfe3a960d10505b\"" May 15 18:03:59.840850 env[1157]: time="2025-05-15T18:03:59.840801182Z" level=info msg="StartContainer for \"b6c175c5350116428a2a24b84b2153898221f1d4e2d5f655edfe3a960d10505b\"" May 15 18:03:59.886286 systemd[1]: run-containerd-runc-k8s.io-b6c175c5350116428a2a24b84b2153898221f1d4e2d5f655edfe3a960d10505b-runc.qE0Dc7.mount: Deactivated successfully. May 15 18:03:59.890625 systemd[1]: Started cri-containerd-b6c175c5350116428a2a24b84b2153898221f1d4e2d5f655edfe3a960d10505b.scope. May 15 18:03:59.916000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.916000 audit[2708]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f9e00e477f8 items=0 ppid=2601 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:59.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236633137356335333530313136343238613261323462383462323135 May 15 18:03:59.917000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.917000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.917000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.917000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.917000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.917000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.917000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.917000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.917000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.917000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.917000 audit: BPF prog-id=112 op=LOAD May 15 18:03:59.917000 audit[2708]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0002ddd68 items=0 ppid=2601 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:59.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236633137356335333530313136343238613261323462383462323135 May 15 18:03:59.917000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.917000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.917000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.917000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.917000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.917000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.917000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.917000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.917000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.917000 audit: BPF prog-id=113 op=LOAD May 15 18:03:59.917000 audit[2708]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0002dddb8 items=0 ppid=2601 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:59.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236633137356335333530313136343238613261323462383462323135 May 15 18:03:59.918000 audit: BPF prog-id=113 op=UNLOAD May 15 18:03:59.918000 audit: BPF prog-id=112 op=UNLOAD May 15 18:03:59.918000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.918000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.918000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.918000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.918000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.918000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.918000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.918000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.918000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.918000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:03:59.918000 audit: BPF prog-id=114 op=LOAD May 15 18:03:59.918000 audit[2708]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0002dde48 items=0 ppid=2601 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:03:59.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236633137356335333530313136343238613261323462383462323135 May 15 18:03:59.942264 env[1157]: time="2025-05-15T18:03:59.942204867Z" level=info msg="StartContainer for \"b6c175c5350116428a2a24b84b2153898221f1d4e2d5f655edfe3a960d10505b\" returns successfully" May 15 18:03:59.946138 env[1157]: time="2025-05-15T18:03:59.946105930Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 15 18:04:00.539389 kubelet[1465]: E0515 18:04:00.539209 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:01.540866 kubelet[1465]: E0515 18:04:01.540739 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:02.531606 env[1157]: time="2025-05-15T18:04:02.531450551Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:04:02.534404 env[1157]: time="2025-05-15T18:04:02.534341973Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:04:02.536723 env[1157]: time="2025-05-15T18:04:02.536668559Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:04:02.538998 env[1157]: time="2025-05-15T18:04:02.538935521Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:04:02.539705 env[1157]: time="2025-05-15T18:04:02.539519775Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 15 18:04:02.541585 kubelet[1465]: E0515 18:04:02.541187 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:02.546732 env[1157]: time="2025-05-15T18:04:02.546646097Z" level=info msg="CreateContainer within sandbox \"4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 15 18:04:02.580505 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3504987297.mount: Deactivated successfully. May 15 18:04:02.587208 env[1157]: time="2025-05-15T18:04:02.587044442Z" level=info msg="CreateContainer within sandbox \"4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"d60205597684a538c43cfea601b6a6706e7cd792a5b4e321ad7b4a9ab6f63832\"" May 15 18:04:02.589332 env[1157]: time="2025-05-15T18:04:02.589223810Z" level=info msg="StartContainer for \"d60205597684a538c43cfea601b6a6706e7cd792a5b4e321ad7b4a9ab6f63832\"" May 15 18:04:02.636683 systemd[1]: Started cri-containerd-d60205597684a538c43cfea601b6a6706e7cd792a5b4e321ad7b4a9ab6f63832.scope. May 15 18:04:02.646325 systemd[1]: run-containerd-runc-k8s.io-d60205597684a538c43cfea601b6a6706e7cd792a5b4e321ad7b4a9ab6f63832-runc.NaqNT2.mount: Deactivated successfully. May 15 18:04:02.672000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.676081 kernel: kauditd_printk_skb: 90 callbacks suppressed May 15 18:04:02.676213 kernel: audit: type=1400 audit(1747332242.672:719): avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.672000 audit[2743]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f5eb0697718 items=0 ppid=2601 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:02.690628 kernel: audit: type=1300 audit(1747332242.672:719): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f5eb0697718 items=0 ppid=2601 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:02.690686 kernel: audit: type=1327 audit(1747332242.672:719): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436303230353539373638346135333863343363666561363031623661 May 15 18:04:02.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436303230353539373638346135333863343363666561363031623661 May 15 18:04:02.672000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.703399 kernel: audit: type=1400 audit(1747332242.672:720): avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.703494 kernel: audit: type=1400 audit(1747332242.672:720): avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.672000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.712920 kernel: audit: type=1400 audit(1747332242.672:720): avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.712973 kernel: audit: type=1400 audit(1747332242.672:720): avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.672000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.672000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.717807 kernel: audit: type=1400 audit(1747332242.672:720): avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.672000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.722592 kernel: audit: type=1400 audit(1747332242.672:720): avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.672000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.672000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.732685 kernel: audit: type=1400 audit(1747332242.672:720): avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.672000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.672000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.672000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.672000 audit: BPF prog-id=115 op=LOAD May 15 18:04:02.672000 audit[2743]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000218708 items=0 ppid=2601 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:02.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436303230353539373638346135333863343363666561363031623661 May 15 18:04:02.680000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.680000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.680000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.680000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.680000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.680000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.680000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.680000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.680000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.680000 audit: BPF prog-id=116 op=LOAD May 15 18:04:02.680000 audit[2743]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000218758 items=0 ppid=2601 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:02.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436303230353539373638346135333863343363666561363031623661 May 15 18:04:02.697000 audit: BPF prog-id=116 op=UNLOAD May 15 18:04:02.697000 audit: BPF prog-id=115 op=UNLOAD May 15 18:04:02.697000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.697000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.697000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.697000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.697000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.697000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.697000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.697000 audit[2743]: AVC avc: denied { perfmon } for pid=2743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.697000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.697000 audit[2743]: AVC avc: denied { bpf } for pid=2743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:02.697000 audit: BPF prog-id=117 op=LOAD May 15 18:04:02.697000 audit[2743]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002187e8 items=0 ppid=2601 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:02.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436303230353539373638346135333863343363666561363031623661 May 15 18:04:02.759810 env[1157]: time="2025-05-15T18:04:02.759761080Z" level=info msg="StartContainer for \"d60205597684a538c43cfea601b6a6706e7cd792a5b4e321ad7b4a9ab6f63832\" returns successfully" May 15 18:04:03.221392 kubelet[1465]: I0515 18:04:03.221054 1465 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-w6x7g" podStartSLOduration=21.581270214 podStartE2EDuration="28.220893922s" podCreationTimestamp="2025-05-15 18:03:35 +0000 UTC" firstStartedPulling="2025-05-15 18:03:50.606909133 +0000 UTC m=+42.983966726" lastFinishedPulling="2025-05-15 18:03:57.246532811 +0000 UTC m=+49.623590434" observedRunningTime="2025-05-15 18:03:58.200483509 +0000 UTC m=+50.577541192" watchObservedRunningTime="2025-05-15 18:04:03.220893922 +0000 UTC m=+55.597951575" May 15 18:04:03.542530 kubelet[1465]: E0515 18:04:03.542270 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:03.728317 kubelet[1465]: I0515 18:04:03.728205 1465 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 15 18:04:03.728317 kubelet[1465]: I0515 18:04:03.728326 1465 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 15 18:04:04.543273 kubelet[1465]: E0515 18:04:04.543201 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:05.544753 kubelet[1465]: E0515 18:04:05.544677 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:06.546591 kubelet[1465]: E0515 18:04:06.546415 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:06.986000 audit[2781]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=2781 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 18:04:06.986000 audit[2781]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffef3154620 a2=0 a3=7ffef315460c items=0 ppid=1763 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:06.986000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 18:04:06.991000 audit[2781]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=2781 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 18:04:06.991000 audit[2781]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffef3154620 a2=0 a3=0 items=0 ppid=1763 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:06.991000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 18:04:07.009000 audit[2785]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=2785 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 18:04:07.009000 audit[2785]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcca76e1b0 a2=0 a3=7ffcca76e19c items=0 ppid=1763 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:07.009000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 18:04:07.015000 audit[2785]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2785 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 18:04:07.015000 audit[2785]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcca76e1b0 a2=0 a3=0 items=0 ppid=1763 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:07.015000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 18:04:07.062254 kubelet[1465]: I0515 18:04:07.062142 1465 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-rnqf2" podStartSLOduration=50.87849902 podStartE2EDuration="59.062074788s" podCreationTimestamp="2025-05-15 18:03:08 +0000 UTC" firstStartedPulling="2025-05-15 18:03:54.358873731 +0000 UTC m=+46.735931314" lastFinishedPulling="2025-05-15 18:04:02.542449448 +0000 UTC m=+54.919507082" observedRunningTime="2025-05-15 18:04:03.224014776 +0000 UTC m=+55.601072469" watchObservedRunningTime="2025-05-15 18:04:07.062074788 +0000 UTC m=+59.439132371" May 15 18:04:07.063137 kubelet[1465]: I0515 18:04:07.063099 1465 topology_manager.go:215] "Topology Admit Handler" podUID="249fef00-cd3b-4ea9-ad0a-1abe4422127c" podNamespace="default" podName="nfs-server-provisioner-0" May 15 18:04:07.075252 systemd[1]: Created slice kubepods-besteffort-pod249fef00_cd3b_4ea9_ad0a_1abe4422127c.slice. May 15 18:04:07.258288 kubelet[1465]: I0515 18:04:07.258141 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qk5fd\" (UniqueName: \"kubernetes.io/projected/249fef00-cd3b-4ea9-ad0a-1abe4422127c-kube-api-access-qk5fd\") pod \"nfs-server-provisioner-0\" (UID: \"249fef00-cd3b-4ea9-ad0a-1abe4422127c\") " pod="default/nfs-server-provisioner-0" May 15 18:04:07.258566 kubelet[1465]: I0515 18:04:07.258520 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/249fef00-cd3b-4ea9-ad0a-1abe4422127c-data\") pod \"nfs-server-provisioner-0\" (UID: \"249fef00-cd3b-4ea9-ad0a-1abe4422127c\") " pod="default/nfs-server-provisioner-0" May 15 18:04:07.546920 kubelet[1465]: E0515 18:04:07.546698 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:07.683426 env[1157]: time="2025-05-15T18:04:07.682370419Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:249fef00-cd3b-4ea9-ad0a-1abe4422127c,Namespace:default,Attempt:0,}" May 15 18:04:07.973216 systemd-networkd[982]: cali60e51b789ff: Link UP May 15 18:04:07.981655 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 18:04:07.982370 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 15 18:04:07.983703 systemd-networkd[982]: cali60e51b789ff: Gained carrier May 15 18:04:08.002255 env[1157]: 2025-05-15 18:04:07.827 [INFO][2787] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.194-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 249fef00-cd3b-4ea9-ad0a-1abe4422127c 1559 0 2025-05-15 18:04:07 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.24.4.194 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.194-k8s-nfs--server--provisioner--0-" May 15 18:04:08.002255 env[1157]: 2025-05-15 18:04:07.827 [INFO][2787] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.194-k8s-nfs--server--provisioner--0-eth0" May 15 18:04:08.002255 env[1157]: 2025-05-15 18:04:07.888 [INFO][2800] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd" HandleID="k8s-pod-network.930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd" Workload="172.24.4.194-k8s-nfs--server--provisioner--0-eth0" May 15 18:04:08.002255 env[1157]: 2025-05-15 18:04:07.911 [INFO][2800] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd" HandleID="k8s-pod-network.930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd" Workload="172.24.4.194-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031b1b0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.194", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-15 18:04:07.888701153 +0000 UTC"}, Hostname:"172.24.4.194", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 18:04:08.002255 env[1157]: 2025-05-15 18:04:07.911 [INFO][2800] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 18:04:08.002255 env[1157]: 2025-05-15 18:04:07.911 [INFO][2800] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 18:04:08.002255 env[1157]: 2025-05-15 18:04:07.912 [INFO][2800] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.194' May 15 18:04:08.002255 env[1157]: 2025-05-15 18:04:07.915 [INFO][2800] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd" host="172.24.4.194" May 15 18:04:08.002255 env[1157]: 2025-05-15 18:04:07.922 [INFO][2800] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.194" May 15 18:04:08.002255 env[1157]: 2025-05-15 18:04:07.930 [INFO][2800] ipam/ipam.go 489: Trying affinity for 192.168.74.128/26 host="172.24.4.194" May 15 18:04:08.002255 env[1157]: 2025-05-15 18:04:07.932 [INFO][2800] ipam/ipam.go 155: Attempting to load block cidr=192.168.74.128/26 host="172.24.4.194" May 15 18:04:08.002255 env[1157]: 2025-05-15 18:04:07.936 [INFO][2800] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.74.128/26 host="172.24.4.194" May 15 18:04:08.002255 env[1157]: 2025-05-15 18:04:07.936 [INFO][2800] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.74.128/26 handle="k8s-pod-network.930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd" host="172.24.4.194" May 15 18:04:08.002255 env[1157]: 2025-05-15 18:04:07.939 [INFO][2800] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd May 15 18:04:08.002255 env[1157]: 2025-05-15 18:04:07.947 [INFO][2800] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.74.128/26 handle="k8s-pod-network.930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd" host="172.24.4.194" May 15 18:04:08.002255 env[1157]: 2025-05-15 18:04:07.960 [INFO][2800] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.74.131/26] block=192.168.74.128/26 handle="k8s-pod-network.930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd" host="172.24.4.194" May 15 18:04:08.002255 env[1157]: 2025-05-15 18:04:07.960 [INFO][2800] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.74.131/26] handle="k8s-pod-network.930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd" host="172.24.4.194" May 15 18:04:08.002255 env[1157]: 2025-05-15 18:04:07.960 [INFO][2800] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 18:04:08.002255 env[1157]: 2025-05-15 18:04:07.960 [INFO][2800] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.74.131/26] IPv6=[] ContainerID="930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd" HandleID="k8s-pod-network.930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd" Workload="172.24.4.194-k8s-nfs--server--provisioner--0-eth0" May 15 18:04:08.007928 env[1157]: 2025-05-15 18:04:07.963 [INFO][2787] cni-plugin/k8s.go 386: Populated endpoint ContainerID="930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.194-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.194-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"249fef00-cd3b-4ea9-ad0a-1abe4422127c", ResourceVersion:"1559", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 18, 4, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.194", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.74.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 18:04:08.007928 env[1157]: 2025-05-15 18:04:07.964 [INFO][2787] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.74.131/32] ContainerID="930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.194-k8s-nfs--server--provisioner--0-eth0" May 15 18:04:08.007928 env[1157]: 2025-05-15 18:04:07.964 [INFO][2787] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.194-k8s-nfs--server--provisioner--0-eth0" May 15 18:04:08.007928 env[1157]: 2025-05-15 18:04:07.982 [INFO][2787] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.194-k8s-nfs--server--provisioner--0-eth0" May 15 18:04:08.008191 env[1157]: 2025-05-15 18:04:07.983 [INFO][2787] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.194-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.194-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"249fef00-cd3b-4ea9-ad0a-1abe4422127c", ResourceVersion:"1559", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 18, 4, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.194", ContainerID:"930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.74.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"06:0e:b3:21:64:11", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 18:04:08.008191 env[1157]: 2025-05-15 18:04:08.000 [INFO][2787] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.194-k8s-nfs--server--provisioner--0-eth0" May 15 18:04:08.036331 kernel: kauditd_printk_skb: 45 callbacks suppressed May 15 18:04:08.036486 kernel: audit: type=1325 audit(1747332248.028:729): table=filter:75 family=2 entries=44 op=nft_register_chain pid=2823 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 18:04:08.028000 audit[2823]: NETFILTER_CFG table=filter:75 family=2 entries=44 op=nft_register_chain pid=2823 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 18:04:08.028000 audit[2823]: SYSCALL arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7ffe7fe30f30 a2=0 a3=7ffe7fe30f1c items=0 ppid=2210 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:08.044780 env[1157]: time="2025-05-15T18:04:08.035676669Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 18:04:08.044780 env[1157]: time="2025-05-15T18:04:08.035755378Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 18:04:08.044780 env[1157]: time="2025-05-15T18:04:08.035788381Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 18:04:08.044780 env[1157]: time="2025-05-15T18:04:08.036098305Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd pid=2832 runtime=io.containerd.runc.v2 May 15 18:04:08.049842 kernel: audit: type=1300 audit(1747332248.028:729): arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7ffe7fe30f30 a2=0 a3=7ffe7fe30f1c items=0 ppid=2210 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:08.049919 kernel: audit: type=1327 audit(1747332248.028:729): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 18:04:08.028000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 18:04:08.067415 systemd[1]: Started cri-containerd-930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd.scope. May 15 18:04:08.103600 kernel: audit: type=1400 audit(1747332248.092:730): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.103848 kernel: audit: type=1400 audit(1747332248.092:731): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.116646 kernel: audit: type=1400 audit(1747332248.092:732): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.116730 kernel: audit: type=1400 audit(1747332248.092:733): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.116779 kernel: audit: type=1400 audit(1747332248.092:734): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.121758 kernel: audit: type=1400 audit(1747332248.092:735): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.126860 kernel: audit: type=1400 audit(1747332248.092:736): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.101000 audit: BPF prog-id=118 op=LOAD May 15 18:04:08.103000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.103000 audit[2839]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2832 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:08.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303530333834316439643039306433383164626132306536353431 May 15 18:04:08.103000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.103000 audit[2839]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2832 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:08.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303530333834316439643039306433383164626132306536353431 May 15 18:04:08.103000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.103000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.103000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.103000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.103000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.103000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.103000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.103000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.103000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.103000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.103000 audit: BPF prog-id=119 op=LOAD May 15 18:04:08.103000 audit[2839]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000228410 items=0 ppid=2832 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:08.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303530333834316439643039306433383164626132306536353431 May 15 18:04:08.120000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.120000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.120000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.120000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.120000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.120000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.120000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.120000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.120000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.120000 audit: BPF prog-id=120 op=LOAD May 15 18:04:08.120000 audit[2839]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000228458 items=0 ppid=2832 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:08.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303530333834316439643039306433383164626132306536353431 May 15 18:04:08.131000 audit: BPF prog-id=120 op=UNLOAD May 15 18:04:08.131000 audit: BPF prog-id=119 op=UNLOAD May 15 18:04:08.131000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.131000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.131000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.131000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.131000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.131000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.131000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.131000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.131000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.131000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:08.131000 audit: BPF prog-id=121 op=LOAD May 15 18:04:08.131000 audit[2839]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000228868 items=0 ppid=2832 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:08.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303530333834316439643039306433383164626132306536353431 May 15 18:04:08.164605 env[1157]: time="2025-05-15T18:04:08.164503604Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:249fef00-cd3b-4ea9-ad0a-1abe4422127c,Namespace:default,Attempt:0,} returns sandbox id \"930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd\"" May 15 18:04:08.166639 env[1157]: time="2025-05-15T18:04:08.166598347Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 15 18:04:08.479697 kubelet[1465]: E0515 18:04:08.479462 1465 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:08.549173 kubelet[1465]: E0515 18:04:08.549121 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:08.551107 env[1157]: time="2025-05-15T18:04:08.550999906Z" level=info msg="StopPodSandbox for \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\"" May 15 18:04:08.719422 env[1157]: 2025-05-15 18:04:08.668 [WARNING][2882] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.194-k8s-csi--node--driver--rnqf2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c728858b-b0dc-4cc7-831f-32aa358609d7", ResourceVersion:"1532", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 18, 3, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.194", ContainerID:"4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873", Pod:"csi-node-driver-rnqf2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.74.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2d7cd9175a6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 18:04:08.719422 env[1157]: 2025-05-15 18:04:08.668 [INFO][2882] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" May 15 18:04:08.719422 env[1157]: 2025-05-15 18:04:08.668 [INFO][2882] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" iface="eth0" netns="" May 15 18:04:08.719422 env[1157]: 2025-05-15 18:04:08.668 [INFO][2882] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" May 15 18:04:08.719422 env[1157]: 2025-05-15 18:04:08.668 [INFO][2882] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" May 15 18:04:08.719422 env[1157]: 2025-05-15 18:04:08.695 [INFO][2889] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" HandleID="k8s-pod-network.1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" Workload="172.24.4.194-k8s-csi--node--driver--rnqf2-eth0" May 15 18:04:08.719422 env[1157]: 2025-05-15 18:04:08.696 [INFO][2889] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 18:04:08.719422 env[1157]: 2025-05-15 18:04:08.696 [INFO][2889] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 18:04:08.719422 env[1157]: 2025-05-15 18:04:08.710 [WARNING][2889] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" HandleID="k8s-pod-network.1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" Workload="172.24.4.194-k8s-csi--node--driver--rnqf2-eth0" May 15 18:04:08.719422 env[1157]: 2025-05-15 18:04:08.710 [INFO][2889] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" HandleID="k8s-pod-network.1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" Workload="172.24.4.194-k8s-csi--node--driver--rnqf2-eth0" May 15 18:04:08.719422 env[1157]: 2025-05-15 18:04:08.713 [INFO][2889] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 18:04:08.719422 env[1157]: 2025-05-15 18:04:08.717 [INFO][2882] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" May 15 18:04:08.720608 env[1157]: time="2025-05-15T18:04:08.720532264Z" level=info msg="TearDown network for sandbox \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\" successfully" May 15 18:04:08.720717 env[1157]: time="2025-05-15T18:04:08.720686856Z" level=info msg="StopPodSandbox for \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\" returns successfully" May 15 18:04:08.721806 env[1157]: time="2025-05-15T18:04:08.721774457Z" level=info msg="RemovePodSandbox for \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\"" May 15 18:04:08.722128 env[1157]: time="2025-05-15T18:04:08.722055288Z" level=info msg="Forcibly stopping sandbox \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\"" May 15 18:04:08.887584 env[1157]: 2025-05-15 18:04:08.783 [WARNING][2908] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.194-k8s-csi--node--driver--rnqf2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c728858b-b0dc-4cc7-831f-32aa358609d7", ResourceVersion:"1532", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 18, 3, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.194", ContainerID:"4f37a5322795f9816baad4f847dce7c8b6c1f4c6c09978c616e1be5ca517c873", Pod:"csi-node-driver-rnqf2", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.74.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2d7cd9175a6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 18:04:08.887584 env[1157]: 2025-05-15 18:04:08.784 [INFO][2908] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" May 15 18:04:08.887584 env[1157]: 2025-05-15 18:04:08.784 [INFO][2908] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" iface="eth0" netns="" May 15 18:04:08.887584 env[1157]: 2025-05-15 18:04:08.784 [INFO][2908] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" May 15 18:04:08.887584 env[1157]: 2025-05-15 18:04:08.784 [INFO][2908] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" May 15 18:04:08.887584 env[1157]: 2025-05-15 18:04:08.847 [INFO][2915] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" HandleID="k8s-pod-network.1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" Workload="172.24.4.194-k8s-csi--node--driver--rnqf2-eth0" May 15 18:04:08.887584 env[1157]: 2025-05-15 18:04:08.849 [INFO][2915] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 18:04:08.887584 env[1157]: 2025-05-15 18:04:08.849 [INFO][2915] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 18:04:08.887584 env[1157]: 2025-05-15 18:04:08.867 [WARNING][2915] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" HandleID="k8s-pod-network.1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" Workload="172.24.4.194-k8s-csi--node--driver--rnqf2-eth0" May 15 18:04:08.887584 env[1157]: 2025-05-15 18:04:08.867 [INFO][2915] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" HandleID="k8s-pod-network.1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" Workload="172.24.4.194-k8s-csi--node--driver--rnqf2-eth0" May 15 18:04:08.887584 env[1157]: 2025-05-15 18:04:08.870 [INFO][2915] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 18:04:08.887584 env[1157]: 2025-05-15 18:04:08.872 [INFO][2908] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562" May 15 18:04:08.887584 env[1157]: time="2025-05-15T18:04:08.887490522Z" level=info msg="TearDown network for sandbox \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\" successfully" May 15 18:04:08.891385 env[1157]: time="2025-05-15T18:04:08.891346770Z" level=info msg="RemovePodSandbox \"1d691f9df889877b9e1a4fb86d4e5cda62b49654c64f4c96e0816a9fc15ac562\" returns successfully" May 15 18:04:08.929026 env[1157]: time="2025-05-15T18:04:08.928969145Z" level=info msg="StopPodSandbox for \"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a\"" May 15 18:04:09.150241 env[1157]: 2025-05-15 18:04:09.078 [WARNING][2941] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"4d6c7e15-9489-4d73-8950-20545cf971db", ResourceVersion:"1512", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 18, 3, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.194", ContainerID:"529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09", Pod:"nginx-deployment-85f456d6dd-w6x7g", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.74.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali63f1c30e9d1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 18:04:09.150241 env[1157]: 2025-05-15 18:04:09.078 [INFO][2941] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" May 15 18:04:09.150241 env[1157]: 2025-05-15 18:04:09.078 [INFO][2941] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" iface="eth0" netns="" May 15 18:04:09.150241 env[1157]: 2025-05-15 18:04:09.078 [INFO][2941] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" May 15 18:04:09.150241 env[1157]: 2025-05-15 18:04:09.078 [INFO][2941] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" May 15 18:04:09.150241 env[1157]: 2025-05-15 18:04:09.125 [INFO][2948] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" HandleID="k8s-pod-network.1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" Workload="172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0" May 15 18:04:09.150241 env[1157]: 2025-05-15 18:04:09.126 [INFO][2948] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 18:04:09.150241 env[1157]: 2025-05-15 18:04:09.126 [INFO][2948] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 18:04:09.150241 env[1157]: 2025-05-15 18:04:09.135 [WARNING][2948] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" HandleID="k8s-pod-network.1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" Workload="172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0" May 15 18:04:09.150241 env[1157]: 2025-05-15 18:04:09.135 [INFO][2948] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" HandleID="k8s-pod-network.1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" Workload="172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0" May 15 18:04:09.150241 env[1157]: 2025-05-15 18:04:09.138 [INFO][2948] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 18:04:09.150241 env[1157]: 2025-05-15 18:04:09.139 [INFO][2941] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" May 15 18:04:09.150241 env[1157]: time="2025-05-15T18:04:09.150129440Z" level=info msg="TearDown network for sandbox \"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a\" successfully" May 15 18:04:09.150241 env[1157]: time="2025-05-15T18:04:09.150166800Z" level=info msg="StopPodSandbox for \"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a\" returns successfully" May 15 18:04:09.184342 env[1157]: time="2025-05-15T18:04:09.184292826Z" level=info msg="RemovePodSandbox for \"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a\"" May 15 18:04:09.184631 env[1157]: time="2025-05-15T18:04:09.184580740Z" level=info msg="Forcibly stopping sandbox \"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a\"" May 15 18:04:09.472698 env[1157]: 2025-05-15 18:04:09.377 [WARNING][2969] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"4d6c7e15-9489-4d73-8950-20545cf971db", ResourceVersion:"1512", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 18, 3, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.194", ContainerID:"529bf9593512aaa4018cddc5c20e36e80a656a2649b3f5f13148548561500d09", Pod:"nginx-deployment-85f456d6dd-w6x7g", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.74.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali63f1c30e9d1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 18:04:09.472698 env[1157]: 2025-05-15 18:04:09.377 [INFO][2969] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" May 15 18:04:09.472698 env[1157]: 2025-05-15 18:04:09.377 [INFO][2969] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" iface="eth0" netns="" May 15 18:04:09.472698 env[1157]: 2025-05-15 18:04:09.377 [INFO][2969] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" May 15 18:04:09.472698 env[1157]: 2025-05-15 18:04:09.377 [INFO][2969] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" May 15 18:04:09.472698 env[1157]: 2025-05-15 18:04:09.451 [INFO][2976] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" HandleID="k8s-pod-network.1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" Workload="172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0" May 15 18:04:09.472698 env[1157]: 2025-05-15 18:04:09.451 [INFO][2976] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 18:04:09.472698 env[1157]: 2025-05-15 18:04:09.451 [INFO][2976] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 18:04:09.472698 env[1157]: 2025-05-15 18:04:09.460 [WARNING][2976] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" HandleID="k8s-pod-network.1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" Workload="172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0" May 15 18:04:09.472698 env[1157]: 2025-05-15 18:04:09.460 [INFO][2976] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" HandleID="k8s-pod-network.1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" Workload="172.24.4.194-k8s-nginx--deployment--85f456d6dd--w6x7g-eth0" May 15 18:04:09.472698 env[1157]: 2025-05-15 18:04:09.463 [INFO][2976] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 18:04:09.472698 env[1157]: 2025-05-15 18:04:09.464 [INFO][2969] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a" May 15 18:04:09.472698 env[1157]: time="2025-05-15T18:04:09.472642490Z" level=info msg="TearDown network for sandbox \"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a\" successfully" May 15 18:04:09.477063 env[1157]: time="2025-05-15T18:04:09.477024880Z" level=info msg="RemovePodSandbox \"1dbdd975165aa9ae2edd42f02ca1173f6518f2f26cc48a5751be7ad5b9662b1a\" returns successfully" May 15 18:04:09.551069 kubelet[1465]: E0515 18:04:09.550983 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:09.755058 systemd-networkd[982]: cali60e51b789ff: Gained IPv6LL May 15 18:04:10.551421 kubelet[1465]: E0515 18:04:10.551257 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:11.552280 kubelet[1465]: E0515 18:04:11.552202 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:12.244383 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2120006608.mount: Deactivated successfully. May 15 18:04:12.552788 kubelet[1465]: E0515 18:04:12.552510 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:13.554252 kubelet[1465]: E0515 18:04:13.554007 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:14.558157 kubelet[1465]: E0515 18:04:14.556363 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:15.395089 env[1157]: time="2025-05-15T18:04:15.394524489Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:04:15.401816 env[1157]: time="2025-05-15T18:04:15.401614167Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:04:15.406504 env[1157]: time="2025-05-15T18:04:15.406436110Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:04:15.411818 env[1157]: time="2025-05-15T18:04:15.411677813Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:04:15.414344 env[1157]: time="2025-05-15T18:04:15.414212232Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 15 18:04:15.426006 env[1157]: time="2025-05-15T18:04:15.425925739Z" level=info msg="CreateContainer within sandbox \"930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 15 18:04:15.464983 env[1157]: time="2025-05-15T18:04:15.464303354Z" level=info msg="CreateContainer within sandbox \"930503841d9d090d381dba20e6541b04239d6901aa6eae0bf5fa779d9e3220cd\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"fa62d32300cc3605e687979ab761cd69048cc60b33eeee4b1155a41e69ce6687\"" May 15 18:04:15.474208 env[1157]: time="2025-05-15T18:04:15.473226769Z" level=info msg="StartContainer for \"fa62d32300cc3605e687979ab761cd69048cc60b33eeee4b1155a41e69ce6687\"" May 15 18:04:15.521221 systemd[1]: Started cri-containerd-fa62d32300cc3605e687979ab761cd69048cc60b33eeee4b1155a41e69ce6687.scope. May 15 18:04:15.543831 kernel: kauditd_printk_skb: 50 callbacks suppressed May 15 18:04:15.544028 kernel: audit: type=1400 audit(1747332255.541:748): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.552069 kernel: audit: type=1400 audit(1747332255.541:749): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.556665 kernel: audit: type=1400 audit(1747332255.541:750): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.556731 kernel: audit: type=1400 audit(1747332255.541:751): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.561194 kubelet[1465]: E0515 18:04:15.561159 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.566279 kernel: audit: type=1400 audit(1747332255.541:752): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.566349 kernel: audit: type=1400 audit(1747332255.541:753): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.570854 kernel: audit: type=1400 audit(1747332255.541:754): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.575627 kernel: audit: type=1400 audit(1747332255.541:755): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.584688 kernel: audit: type=1400 audit(1747332255.541:756): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.547000 audit: BPF prog-id=122 op=LOAD May 15 18:04:15.547000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.547000 audit[2992]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2832 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:15.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661363264333233303063633336303565363837393739616237363163 May 15 18:04:15.547000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.547000 audit[2992]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2832 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:15.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661363264333233303063633336303565363837393739616237363163 May 15 18:04:15.548000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.591684 kernel: audit: type=1400 audit(1747332255.547:757): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.548000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.548000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.548000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.548000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.548000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.548000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.548000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.548000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.548000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.548000 audit: BPF prog-id=123 op=LOAD May 15 18:04:15.548000 audit[2992]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e7c60 items=0 ppid=2832 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:15.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661363264333233303063633336303565363837393739616237363163 May 15 18:04:15.551000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.551000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.551000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.551000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.551000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.551000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.551000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.551000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.551000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.551000 audit: BPF prog-id=124 op=LOAD May 15 18:04:15.551000 audit[2992]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e7ca8 items=0 ppid=2832 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:15.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661363264333233303063633336303565363837393739616237363163 May 15 18:04:15.551000 audit: BPF prog-id=124 op=UNLOAD May 15 18:04:15.551000 audit: BPF prog-id=123 op=UNLOAD May 15 18:04:15.551000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.551000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.551000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.551000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.551000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.551000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.551000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.551000 audit[2992]: AVC avc: denied { perfmon } for pid=2992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.551000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.551000 audit[2992]: AVC avc: denied { bpf } for pid=2992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:15.551000 audit: BPF prog-id=125 op=LOAD May 15 18:04:15.551000 audit[2992]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c20b8 items=0 ppid=2832 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:15.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661363264333233303063633336303565363837393739616237363163 May 15 18:04:15.611589 env[1157]: time="2025-05-15T18:04:15.611512500Z" level=info msg="StartContainer for \"fa62d32300cc3605e687979ab761cd69048cc60b33eeee4b1155a41e69ce6687\" returns successfully" May 15 18:04:15.658000 audit[3019]: AVC avc: denied { search } for pid=3019 comm="rpcbind" name="crypto" dev="proc" ino=22337 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c876 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 18:04:15.658000 audit[3019]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fbb622080c0 a2=0 a3=0 items=0 ppid=3002 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c876 key=(null) May 15 18:04:15.658000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 15 18:04:15.702000 audit[3024]: AVC avc: denied { search } for pid=3024 comm="dbus-daemon" name="crypto" dev="proc" ino=22337 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c876 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 18:04:15.702000 audit[3024]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fe1742fb0c0 a2=0 a3=0 items=0 ppid=3002 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c876 key=(null) May 15 18:04:15.702000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 15 18:04:15.707000 audit[3025]: AVC avc: denied { watch } for pid=3025 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538200 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c876 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c311,c876 tclass=dir permissive=0 May 15 18:04:15.707000 audit[3025]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=5558a2529800 a2=2c8 a3=7ffdf83e4abc items=0 ppid=3002 pid=3025 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c876 key=(null) May 15 18:04:15.707000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 15 18:04:15.711000 audit[3026]: AVC avc: denied { read } for pid=3026 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22949 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c876 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 15 18:04:15.711000 audit[3026]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f39002a9320 a1=80000 a2=d a3=7fff2116e680 items=0 ppid=3002 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c876 key=(null) May 15 18:04:15.711000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 15 18:04:15.712000 audit[3026]: AVC avc: denied { search } for pid=3026 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22337 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c876 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 18:04:15.712000 audit[3026]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f38ff7fd0c0 a2=0 a3=0 items=0 ppid=3002 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c876 key=(null) May 15 18:04:15.712000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 15 18:04:16.432783 kubelet[1465]: I0515 18:04:16.432459 1465 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.179325212 podStartE2EDuration="9.432351865s" podCreationTimestamp="2025-05-15 18:04:07 +0000 UTC" firstStartedPulling="2025-05-15 18:04:08.166041356 +0000 UTC m=+60.543098949" lastFinishedPulling="2025-05-15 18:04:15.419067969 +0000 UTC m=+67.796125602" observedRunningTime="2025-05-15 18:04:16.431031806 +0000 UTC m=+68.808089440" watchObservedRunningTime="2025-05-15 18:04:16.432351865 +0000 UTC m=+68.809409498" May 15 18:04:16.489000 audit[3031]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=3031 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 18:04:16.489000 audit[3031]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffff93d1400 a2=0 a3=7ffff93d13ec items=0 ppid=1763 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:16.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 18:04:16.499000 audit[3031]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=3031 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 18:04:16.499000 audit[3031]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffff93d1400 a2=0 a3=7ffff93d13ec items=0 ppid=1763 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:16.499000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 18:04:16.561674 kubelet[1465]: E0515 18:04:16.561508 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:17.562493 kubelet[1465]: E0515 18:04:17.562365 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:18.563025 kubelet[1465]: E0515 18:04:18.562962 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:19.564876 kubelet[1465]: E0515 18:04:19.564713 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:20.565365 kubelet[1465]: E0515 18:04:20.565271 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:21.565853 kubelet[1465]: E0515 18:04:21.565780 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:22.566445 kubelet[1465]: E0515 18:04:22.566364 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:23.566849 kubelet[1465]: E0515 18:04:23.566764 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:24.569190 kubelet[1465]: E0515 18:04:24.569069 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:25.570612 kubelet[1465]: E0515 18:04:25.570418 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:26.571463 kubelet[1465]: E0515 18:04:26.571301 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:27.572218 kubelet[1465]: E0515 18:04:27.572130 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:28.480161 kubelet[1465]: E0515 18:04:28.480051 1465 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:28.573517 kubelet[1465]: E0515 18:04:28.573371 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:29.576013 kubelet[1465]: E0515 18:04:29.575928 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:30.577788 kubelet[1465]: E0515 18:04:30.577670 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:31.579394 kubelet[1465]: E0515 18:04:31.579217 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:32.580637 kubelet[1465]: E0515 18:04:32.580510 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:33.581375 kubelet[1465]: E0515 18:04:33.581259 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:34.582307 kubelet[1465]: E0515 18:04:34.582170 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:35.583177 kubelet[1465]: E0515 18:04:35.582749 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:36.584133 kubelet[1465]: E0515 18:04:36.583983 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:37.584881 kubelet[1465]: E0515 18:04:37.584807 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:38.586761 kubelet[1465]: E0515 18:04:38.586695 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:39.588673 kubelet[1465]: E0515 18:04:39.588514 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:40.235781 kubelet[1465]: I0515 18:04:40.235656 1465 topology_manager.go:215] "Topology Admit Handler" podUID="de89a744-404f-41e6-9faa-6afbc1cb3a8c" podNamespace="default" podName="test-pod-1" May 15 18:04:40.262081 systemd[1]: Created slice kubepods-besteffort-podde89a744_404f_41e6_9faa_6afbc1cb3a8c.slice. May 15 18:04:40.346629 kubelet[1465]: I0515 18:04:40.346354 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-69f8b6a8-c7f1-4832-9df6-f35c242a590e\" (UniqueName: \"kubernetes.io/nfs/de89a744-404f-41e6-9faa-6afbc1cb3a8c-pvc-69f8b6a8-c7f1-4832-9df6-f35c242a590e\") pod \"test-pod-1\" (UID: \"de89a744-404f-41e6-9faa-6afbc1cb3a8c\") " pod="default/test-pod-1" May 15 18:04:40.347670 kubelet[1465]: I0515 18:04:40.347513 1465 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wb5vn\" (UniqueName: \"kubernetes.io/projected/de89a744-404f-41e6-9faa-6afbc1cb3a8c-kube-api-access-wb5vn\") pod \"test-pod-1\" (UID: \"de89a744-404f-41e6-9faa-6afbc1cb3a8c\") " pod="default/test-pod-1" May 15 18:04:40.534072 kernel: Failed to create system directory netfs May 15 18:04:40.534399 kernel: kauditd_printk_skb: 68 callbacks suppressed May 15 18:04:40.534516 kernel: audit: type=1400 audit(1747332280.522:773): avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.522000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.544267 kernel: Failed to create system directory netfs May 15 18:04:40.544326 kernel: audit: type=1400 audit(1747332280.522:773): avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.522000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.553442 kernel: Failed to create system directory netfs May 15 18:04:40.553564 kernel: audit: type=1400 audit(1747332280.522:773): avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.522000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.561465 kernel: Failed to create system directory netfs May 15 18:04:40.561522 kernel: audit: type=1400 audit(1747332280.522:773): avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.522000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.522000 audit[3088]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55cfc996c5e0 a1=153bc a2=55cf92e7c2b0 a3=5 items=0 ppid=473 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:40.606986 kernel: audit: type=1300 audit(1747332280.522:773): arch=c000003e syscall=175 success=yes exit=0 a0=55cfc996c5e0 a1=153bc a2=55cf92e7c2b0 a3=5 items=0 ppid=473 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:40.607043 kernel: Failed to create system directory fscache May 15 18:04:40.607261 kubelet[1465]: E0515 18:04:40.607215 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:40.610516 kernel: audit: type=1327 audit(1747332280.522:773): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 18:04:40.610590 kernel: Failed to create system directory fscache May 15 18:04:40.522000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 18:04:40.617206 kernel: audit: type=1400 audit(1747332280.589:774): avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.617286 kernel: Failed to create system directory fscache May 15 18:04:40.589000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.624815 kernel: audit: type=1400 audit(1747332280.589:774): avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.624909 kernel: Failed to create system directory fscache May 15 18:04:40.589000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.632372 kernel: audit: type=1400 audit(1747332280.589:774): avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.632502 kernel: Failed to create system directory fscache May 15 18:04:40.589000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.639885 kernel: audit: type=1400 audit(1747332280.589:774): avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.639991 kernel: Failed to create system directory fscache May 15 18:04:40.589000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.589000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.589000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.589000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.642627 kernel: Failed to create system directory fscache May 15 18:04:40.642682 kernel: Failed to create system directory fscache May 15 18:04:40.589000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.589000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.645139 kernel: Failed to create system directory fscache May 15 18:04:40.645205 kernel: Failed to create system directory fscache May 15 18:04:40.589000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.589000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.647606 kernel: Failed to create system directory fscache May 15 18:04:40.647649 kernel: Failed to create system directory fscache May 15 18:04:40.589000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.589000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.650194 kernel: Failed to create system directory fscache May 15 18:04:40.650258 kernel: Failed to create system directory fscache May 15 18:04:40.589000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.655009 kernel: FS-Cache: Loaded May 15 18:04:40.589000 audit[3088]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55cfc9b819c0 a1=4c0fc a2=55cf92e7c2b0 a3=5 items=0 ppid=473 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:40.589000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.716224 kernel: Failed to create system directory sunrpc May 15 18:04:40.716374 kernel: Failed to create system directory sunrpc May 15 18:04:40.716492 kernel: Failed to create system directory sunrpc May 15 18:04:40.716616 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.719164 kernel: Failed to create system directory sunrpc May 15 18:04:40.719281 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.721792 kernel: Failed to create system directory sunrpc May 15 18:04:40.721946 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.724540 kernel: Failed to create system directory sunrpc May 15 18:04:40.724690 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.727260 kernel: Failed to create system directory sunrpc May 15 18:04:40.727370 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.730103 kernel: Failed to create system directory sunrpc May 15 18:04:40.730323 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.731880 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.733734 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.737033 kernel: Failed to create system directory sunrpc May 15 18:04:40.737176 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.742410 kernel: Failed to create system directory sunrpc May 15 18:04:40.742590 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.743761 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.746954 kernel: Failed to create system directory sunrpc May 15 18:04:40.747154 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.749738 kernel: Failed to create system directory sunrpc May 15 18:04:40.749928 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.751102 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.753729 kernel: Failed to create system directory sunrpc May 15 18:04:40.753880 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.755012 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.756308 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.757641 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.760388 kernel: Failed to create system directory sunrpc May 15 18:04:40.760611 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.761774 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.763143 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.764582 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.765919 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.767299 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.768496 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.771081 kernel: Failed to create system directory sunrpc May 15 18:04:40.771244 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.772385 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.773723 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.774991 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.776282 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.777503 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.778704 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.781142 kernel: Failed to create system directory sunrpc May 15 18:04:40.781260 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.783682 kernel: Failed to create system directory sunrpc May 15 18:04:40.783815 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.784976 kernel: Failed to create system directory sunrpc May 15 18:04:40.798379 kernel: Failed to create system directory sunrpc May 15 18:04:40.799988 kernel: Failed to create system directory sunrpc May 15 18:04:40.800157 kernel: Failed to create system directory sunrpc May 15 18:04:40.800242 kernel: Failed to create system directory sunrpc May 15 18:04:40.800292 kernel: Failed to create system directory sunrpc May 15 18:04:40.800352 kernel: Failed to create system directory sunrpc May 15 18:04:40.800403 kernel: Failed to create system directory sunrpc May 15 18:04:40.800490 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.806628 kernel: Failed to create system directory sunrpc May 15 18:04:40.806766 kernel: Failed to create system directory sunrpc May 15 18:04:40.807069 kernel: Failed to create system directory sunrpc May 15 18:04:40.807133 kernel: Failed to create system directory sunrpc May 15 18:04:40.807254 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.808470 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.811151 kernel: Failed to create system directory sunrpc May 15 18:04:40.811295 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.813919 kernel: Failed to create system directory sunrpc May 15 18:04:40.814069 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.816616 kernel: Failed to create system directory sunrpc May 15 18:04:40.816722 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.822392 kernel: Failed to create system directory sunrpc May 15 18:04:40.822529 kernel: Failed to create system directory sunrpc May 15 18:04:40.822653 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.822846 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.824914 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.826295 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.826895 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.829227 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.831157 kernel: Failed to create system directory sunrpc May 15 18:04:40.831289 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.833868 kernel: Failed to create system directory sunrpc May 15 18:04:40.834023 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.838876 kernel: Failed to create system directory sunrpc May 15 18:04:40.838957 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.840339 kernel: Failed to create system directory sunrpc May 15 18:04:40.840423 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.842929 kernel: Failed to create system directory sunrpc May 15 18:04:40.842994 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.845579 kernel: Failed to create system directory sunrpc May 15 18:04:40.845661 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.848299 kernel: Failed to create system directory sunrpc May 15 18:04:40.848396 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.851009 kernel: Failed to create system directory sunrpc May 15 18:04:40.851090 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.853673 kernel: Failed to create system directory sunrpc May 15 18:04:40.853755 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.856331 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.857783 kernel: Failed to create system directory sunrpc May 15 18:04:40.857836 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.860574 kernel: Failed to create system directory sunrpc May 15 18:04:40.860638 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.863348 kernel: Failed to create system directory sunrpc May 15 18:04:40.863395 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.866120 kernel: Failed to create system directory sunrpc May 15 18:04:40.866178 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.867519 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.870364 kernel: Failed to create system directory sunrpc May 15 18:04:40.870434 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.873019 kernel: Failed to create system directory sunrpc May 15 18:04:40.873089 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.875649 kernel: Failed to create system directory sunrpc May 15 18:04:40.875695 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.878230 kernel: Failed to create system directory sunrpc May 15 18:04:40.878301 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.880997 kernel: Failed to create system directory sunrpc May 15 18:04:40.881053 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.883630 kernel: Failed to create system directory sunrpc May 15 18:04:40.883684 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.886354 kernel: Failed to create system directory sunrpc May 15 18:04:40.886403 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.891071 kernel: Failed to create system directory sunrpc May 15 18:04:40.891139 kernel: Failed to create system directory sunrpc May 15 18:04:40.891161 kernel: Failed to create system directory sunrpc May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.689000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:40.893571 kernel: Failed to create system directory sunrpc May 15 18:04:40.906796 kernel: RPC: Registered named UNIX socket transport module. May 15 18:04:40.906924 kernel: RPC: Registered udp transport module. May 15 18:04:40.906959 kernel: RPC: Registered tcp transport module. May 15 18:04:40.908032 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 15 18:04:40.689000 audit[3088]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55cfc9bcdad0 a1=1a814c a2=55cf92e7c2b0 a3=5 items=6 ppid=473 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:40.689000 audit: CWD cwd="/" May 15 18:04:40.689000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:04:40.689000 audit: PATH item=1 name=(null) inode=23620 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:04:40.689000 audit: PATH item=2 name=(null) inode=23620 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:04:40.689000 audit: PATH item=3 name=(null) inode=23621 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:04:40.689000 audit: PATH item=4 name=(null) inode=23620 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:04:40.689000 audit: PATH item=5 name=(null) inode=23622 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 18:04:40.689000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.017699 kernel: Failed to create system directory nfs May 15 18:04:41.017832 kernel: Failed to create system directory nfs May 15 18:04:41.017884 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.020042 kernel: Failed to create system directory nfs May 15 18:04:41.020177 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.021413 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.022673 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.025606 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.028770 kernel: Failed to create system directory nfs May 15 18:04:41.028882 kernel: Failed to create system directory nfs May 15 18:04:41.028979 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.038124 kernel: Failed to create system directory nfs May 15 18:04:41.038291 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.042102 kernel: Failed to create system directory nfs May 15 18:04:41.042229 kernel: Failed to create system directory nfs May 15 18:04:41.042290 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.045259 kernel: Failed to create system directory nfs May 15 18:04:41.045398 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.046603 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.047788 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.053209 kernel: Failed to create system directory nfs May 15 18:04:41.053414 kernel: Failed to create system directory nfs May 15 18:04:41.053528 kernel: Failed to create system directory nfs May 15 18:04:41.053807 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.055789 kernel: Failed to create system directory nfs May 15 18:04:41.055913 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.057260 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.058378 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.059670 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.061069 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.062323 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.063682 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.065080 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.066172 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.067644 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.070438 kernel: Failed to create system directory nfs May 15 18:04:41.070572 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.071805 kernel: Failed to create system directory nfs May 15 18:04:41.074702 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.075971 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.078437 kernel: Failed to create system directory nfs May 15 18:04:41.078597 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.079702 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.082166 kernel: Failed to create system directory nfs May 15 18:04:41.082288 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.084829 kernel: Failed to create system directory nfs May 15 18:04:41.084948 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.087130 kernel: Failed to create system directory nfs May 15 18:04:41.087210 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.089601 kernel: Failed to create system directory nfs May 15 18:04:41.089679 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.092016 kernel: Failed to create system directory nfs May 15 18:04:41.092080 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.094459 kernel: Failed to create system directory nfs May 15 18:04:41.094534 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.096925 kernel: Failed to create system directory nfs May 15 18:04:41.096959 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.099538 kernel: Failed to create system directory nfs May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.001000 audit[3088]: AVC avc: denied { confidentiality } for pid=3088 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.102425 kernel: Failed to create system directory nfs May 15 18:04:41.102636 kernel: Failed to create system directory nfs May 15 18:04:41.128701 kernel: FS-Cache: Netfs 'nfs' registered for caching May 15 18:04:41.001000 audit[3088]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55cfc9deea10 a1=16eae4 a2=55cf92e7c2b0 a3=5 items=0 ppid=473 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:41.001000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.209736 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.212583 kernel: Failed to create system directory nfs4 May 15 18:04:41.212638 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.213960 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.215360 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.216724 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.218250 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.219772 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.221194 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.222938 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.224330 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.225809 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.227367 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.229033 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.230613 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.232123 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.234145 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.235940 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.237391 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.239017 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.240698 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.242177 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.243574 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.244963 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.246742 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.248354 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.250116 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.251591 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.253132 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.254732 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.256344 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.258194 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.259772 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.261366 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.262809 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.264359 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.265892 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.267633 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.274580 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.278553 kernel: Failed to create system directory nfs4 May 15 18:04:41.278614 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.281693 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.286381 kernel: Failed to create system directory nfs4 May 15 18:04:41.286458 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.288579 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.291681 kernel: Failed to create system directory nfs4 May 15 18:04:41.291719 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.293044 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.294513 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.297475 kernel: Failed to create system directory nfs4 May 15 18:04:41.297514 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.300494 kernel: Failed to create system directory nfs4 May 15 18:04:41.300574 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.303402 kernel: Failed to create system directory nfs4 May 15 18:04:41.303467 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.306537 kernel: Failed to create system directory nfs4 May 15 18:04:41.306618 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.309732 kernel: Failed to create system directory nfs4 May 15 18:04:41.309787 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.311560 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.313044 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.314561 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.316176 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.317709 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.319302 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.320954 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.322568 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.324008 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.325404 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.331281 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.334448 kernel: Failed to create system directory nfs4 May 15 18:04:41.334518 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.337671 kernel: Failed to create system directory nfs4 May 15 18:04:41.337738 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.339428 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.342635 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.346345 kernel: Failed to create system directory nfs4 May 15 18:04:41.346405 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.348234 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.349862 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.351453 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.354661 kernel: Failed to create system directory nfs4 May 15 18:04:41.354726 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.356218 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.357975 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.359363 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.361308 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.362946 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.364397 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.365861 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.367400 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.370272 kernel: Failed to create system directory nfs4 May 15 18:04:41.370337 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.372147 kernel: Failed to create system directory nfs4 May 15 18:04:41.188000 audit[3093]: AVC avc: denied { confidentiality } for pid=3093 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.570643 kernel: NFS: Registering the id_resolver key type May 15 18:04:41.570959 kernel: Key type id_resolver registered May 15 18:04:41.571080 kernel: Key type id_legacy registered May 15 18:04:41.188000 audit[3093]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7ff80311c010 a1=209404 a2=55e510fa22b0 a3=5 items=0 ppid=473 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:41.188000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 15 18:04:41.608842 kubelet[1465]: E0515 18:04:41.608668 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.622649 kernel: Failed to create system directory rpcgss May 15 18:04:41.622770 kernel: Failed to create system directory rpcgss May 15 18:04:41.622816 kernel: Failed to create system directory rpcgss May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.627730 kernel: Failed to create system directory rpcgss May 15 18:04:41.627934 kernel: Failed to create system directory rpcgss May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.629243 kernel: Failed to create system directory rpcgss May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.632341 kernel: Failed to create system directory rpcgss May 15 18:04:41.632425 kernel: Failed to create system directory rpcgss May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.635474 kernel: Failed to create system directory rpcgss May 15 18:04:41.635523 kernel: Failed to create system directory rpcgss May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.637081 kernel: Failed to create system directory rpcgss May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.638689 kernel: Failed to create system directory rpcgss May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.641762 kernel: Failed to create system directory rpcgss May 15 18:04:41.641808 kernel: Failed to create system directory rpcgss May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.644920 kernel: Failed to create system directory rpcgss May 15 18:04:41.645056 kernel: Failed to create system directory rpcgss May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.646409 kernel: Failed to create system directory rpcgss May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.647968 kernel: Failed to create system directory rpcgss May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.650886 kernel: Failed to create system directory rpcgss May 15 18:04:41.650975 kernel: Failed to create system directory rpcgss May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.652321 kernel: Failed to create system directory rpcgss May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.653843 kernel: Failed to create system directory rpcgss May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.655418 kernel: Failed to create system directory rpcgss May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.658315 kernel: Failed to create system directory rpcgss May 15 18:04:41.658372 kernel: Failed to create system directory rpcgss May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.613000 audit[3095]: AVC avc: denied { confidentiality } for pid=3095 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 18:04:41.661234 kernel: Failed to create system directory rpcgss May 15 18:04:41.613000 audit[3095]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fe700b3d010 a1=70b64 a2=555a5c5b62b0 a3=5 items=0 ppid=473 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:41.613000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 15 18:04:41.707785 nfsidmap[3102]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' May 15 18:04:41.718522 nfsidmap[3103]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' May 15 18:04:41.737000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2589 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 18:04:41.737000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2589 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 18:04:41.737000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2589 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 18:04:41.738000 audit[1232]: AVC avc: denied { watch_reads } for pid=1232 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2589 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 18:04:41.738000 audit[1232]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5602c8478900 a2=10 a3=d7812d9789dd7284 items=0 ppid=1 pid=1232 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:41.738000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 18:04:41.740000 audit[1232]: AVC avc: denied { watch_reads } for pid=1232 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2589 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 18:04:41.740000 audit[1232]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5602c8478900 a2=10 a3=d7812d9789dd7284 items=0 ppid=1 pid=1232 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:41.740000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 18:04:41.740000 audit[1232]: AVC avc: denied { watch_reads } for pid=1232 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2589 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 18:04:41.740000 audit[1232]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5602c8478900 a2=10 a3=d7812d9789dd7284 items=0 ppid=1 pid=1232 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:41.740000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 18:04:41.777458 env[1157]: time="2025-05-15T18:04:41.777106958Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:de89a744-404f-41e6-9faa-6afbc1cb3a8c,Namespace:default,Attempt:0,}" May 15 18:04:42.272908 systemd-networkd[982]: cali5ec59c6bf6e: Link UP May 15 18:04:42.285418 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 18:04:42.285712 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 15 18:04:42.288854 systemd-networkd[982]: cali5ec59c6bf6e: Gained carrier May 15 18:04:42.330367 env[1157]: 2025-05-15 18:04:41.969 [INFO][3104] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.194-k8s-test--pod--1-eth0 default de89a744-404f-41e6-9faa-6afbc1cb3a8c 1658 0 2025-05-15 18:04:09 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.194 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.194-k8s-test--pod--1-" May 15 18:04:42.330367 env[1157]: 2025-05-15 18:04:41.972 [INFO][3104] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.194-k8s-test--pod--1-eth0" May 15 18:04:42.330367 env[1157]: 2025-05-15 18:04:42.096 [INFO][3118] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b" HandleID="k8s-pod-network.72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b" Workload="172.24.4.194-k8s-test--pod--1-eth0" May 15 18:04:42.330367 env[1157]: 2025-05-15 18:04:42.138 [INFO][3118] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b" HandleID="k8s-pod-network.72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b" Workload="172.24.4.194-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002852c0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.194", "pod":"test-pod-1", "timestamp":"2025-05-15 18:04:42.096921368 +0000 UTC"}, Hostname:"172.24.4.194", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 18:04:42.330367 env[1157]: 2025-05-15 18:04:42.138 [INFO][3118] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 18:04:42.330367 env[1157]: 2025-05-15 18:04:42.139 [INFO][3118] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 18:04:42.330367 env[1157]: 2025-05-15 18:04:42.139 [INFO][3118] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.194' May 15 18:04:42.330367 env[1157]: 2025-05-15 18:04:42.147 [INFO][3118] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b" host="172.24.4.194" May 15 18:04:42.330367 env[1157]: 2025-05-15 18:04:42.161 [INFO][3118] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.194" May 15 18:04:42.330367 env[1157]: 2025-05-15 18:04:42.176 [INFO][3118] ipam/ipam.go 489: Trying affinity for 192.168.74.128/26 host="172.24.4.194" May 15 18:04:42.330367 env[1157]: 2025-05-15 18:04:42.183 [INFO][3118] ipam/ipam.go 155: Attempting to load block cidr=192.168.74.128/26 host="172.24.4.194" May 15 18:04:42.330367 env[1157]: 2025-05-15 18:04:42.193 [INFO][3118] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.74.128/26 host="172.24.4.194" May 15 18:04:42.330367 env[1157]: 2025-05-15 18:04:42.194 [INFO][3118] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.74.128/26 handle="k8s-pod-network.72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b" host="172.24.4.194" May 15 18:04:42.330367 env[1157]: 2025-05-15 18:04:42.200 [INFO][3118] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b May 15 18:04:42.330367 env[1157]: 2025-05-15 18:04:42.217 [INFO][3118] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.74.128/26 handle="k8s-pod-network.72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b" host="172.24.4.194" May 15 18:04:42.330367 env[1157]: 2025-05-15 18:04:42.242 [INFO][3118] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.74.132/26] block=192.168.74.128/26 handle="k8s-pod-network.72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b" host="172.24.4.194" May 15 18:04:42.330367 env[1157]: 2025-05-15 18:04:42.242 [INFO][3118] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.74.132/26] handle="k8s-pod-network.72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b" host="172.24.4.194" May 15 18:04:42.330367 env[1157]: 2025-05-15 18:04:42.243 [INFO][3118] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 18:04:42.330367 env[1157]: 2025-05-15 18:04:42.243 [INFO][3118] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.74.132/26] IPv6=[] ContainerID="72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b" HandleID="k8s-pod-network.72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b" Workload="172.24.4.194-k8s-test--pod--1-eth0" May 15 18:04:42.330367 env[1157]: 2025-05-15 18:04:42.246 [INFO][3104] cni-plugin/k8s.go 386: Populated endpoint ContainerID="72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.194-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.194-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"de89a744-404f-41e6-9faa-6afbc1cb3a8c", ResourceVersion:"1658", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 18, 4, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.194", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.74.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 18:04:42.332943 env[1157]: 2025-05-15 18:04:42.247 [INFO][3104] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.74.132/32] ContainerID="72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.194-k8s-test--pod--1-eth0" May 15 18:04:42.332943 env[1157]: 2025-05-15 18:04:42.247 [INFO][3104] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.194-k8s-test--pod--1-eth0" May 15 18:04:42.332943 env[1157]: 2025-05-15 18:04:42.293 [INFO][3104] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.194-k8s-test--pod--1-eth0" May 15 18:04:42.332943 env[1157]: 2025-05-15 18:04:42.295 [INFO][3104] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.194-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.194-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"de89a744-404f-41e6-9faa-6afbc1cb3a8c", ResourceVersion:"1658", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 18, 4, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.194", ContainerID:"72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.74.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"d2:4e:4a:86:ff:2d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 18:04:42.332943 env[1157]: 2025-05-15 18:04:42.314 [INFO][3104] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.194-k8s-test--pod--1-eth0" May 15 18:04:42.356000 audit[3144]: NETFILTER_CFG table=filter:78 family=2 entries=34 op=nft_register_chain pid=3144 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 18:04:42.356000 audit[3144]: SYSCALL arch=c000003e syscall=46 success=yes exit=18196 a0=3 a1=7ffd6e1b5f50 a2=0 a3=7ffd6e1b5f3c items=0 ppid=2210 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:42.356000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 18:04:42.360396 env[1157]: time="2025-05-15T18:04:42.360256993Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 18:04:42.360521 env[1157]: time="2025-05-15T18:04:42.360394181Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 18:04:42.360521 env[1157]: time="2025-05-15T18:04:42.360412746Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 18:04:42.360883 env[1157]: time="2025-05-15T18:04:42.360823189Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b pid=3148 runtime=io.containerd.runc.v2 May 15 18:04:42.388310 systemd[1]: Started cri-containerd-72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b.scope. May 15 18:04:42.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.404000 audit: BPF prog-id=126 op=LOAD May 15 18:04:42.405000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.405000 audit[3159]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3148 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:42.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732373336636132393661643632646531663835336636656465666566 May 15 18:04:42.405000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.405000 audit[3159]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3148 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:42.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732373336636132393661643632646531663835336636656465666566 May 15 18:04:42.405000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.405000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.405000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.405000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.405000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.405000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.405000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.405000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.405000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.405000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.405000 audit: BPF prog-id=127 op=LOAD May 15 18:04:42.405000 audit[3159]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00037c4c0 items=0 ppid=3148 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:42.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732373336636132393661643632646531663835336636656465666566 May 15 18:04:42.405000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.405000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.405000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.405000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.405000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.405000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.405000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.405000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.405000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.405000 audit: BPF prog-id=128 op=LOAD May 15 18:04:42.405000 audit[3159]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00037c508 items=0 ppid=3148 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:42.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732373336636132393661643632646531663835336636656465666566 May 15 18:04:42.406000 audit: BPF prog-id=128 op=UNLOAD May 15 18:04:42.406000 audit: BPF prog-id=127 op=UNLOAD May 15 18:04:42.406000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.406000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.406000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.406000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.406000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.406000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.406000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.406000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.406000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.406000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:42.406000 audit: BPF prog-id=129 op=LOAD May 15 18:04:42.406000 audit[3159]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00037c918 items=0 ppid=3148 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:42.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732373336636132393661643632646531663835336636656465666566 May 15 18:04:42.441688 env[1157]: time="2025-05-15T18:04:42.441570116Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:de89a744-404f-41e6-9faa-6afbc1cb3a8c,Namespace:default,Attempt:0,} returns sandbox id \"72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b\"" May 15 18:04:42.444270 env[1157]: time="2025-05-15T18:04:42.444228869Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 15 18:04:42.609780 kubelet[1465]: E0515 18:04:42.609651 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:42.983961 env[1157]: time="2025-05-15T18:04:42.983388929Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:04:42.988474 env[1157]: time="2025-05-15T18:04:42.988391803Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:04:42.994747 env[1157]: time="2025-05-15T18:04:42.994670077Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:04:43.000444 env[1157]: time="2025-05-15T18:04:43.000367097Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 18:04:43.003707 env[1157]: time="2025-05-15T18:04:43.003588157Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 15 18:04:43.012824 env[1157]: time="2025-05-15T18:04:43.012726672Z" level=info msg="CreateContainer within sandbox \"72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 15 18:04:43.049638 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2720692872.mount: Deactivated successfully. May 15 18:04:43.076807 env[1157]: time="2025-05-15T18:04:43.076705952Z" level=info msg="CreateContainer within sandbox \"72736ca296ad62de1f853f6edefefd23261be7cdfd828943cec7762566f04f8b\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"9bbbdddaa2f16afa2de46e876b46ca097464f0bacfc77f1cd8b66e7a669e8274\"" May 15 18:04:43.079171 env[1157]: time="2025-05-15T18:04:43.079109635Z" level=info msg="StartContainer for \"9bbbdddaa2f16afa2de46e876b46ca097464f0bacfc77f1cd8b66e7a669e8274\"" May 15 18:04:43.122706 systemd[1]: Started cri-containerd-9bbbdddaa2f16afa2de46e876b46ca097464f0bacfc77f1cd8b66e7a669e8274.scope. May 15 18:04:43.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.146000 audit: BPF prog-id=130 op=LOAD May 15 18:04:43.148000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3148 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:43.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962626264646461613266313661666132646534366538373662343663 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3148 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:43.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962626264646461613266313661666132646534366538373662343663 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit: BPF prog-id=131 op=LOAD May 15 18:04:43.148000 audit[3189]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000243a0 items=0 ppid=3148 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:43.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962626264646461613266313661666132646534366538373662343663 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit: BPF prog-id=132 op=LOAD May 15 18:04:43.148000 audit[3189]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000243e8 items=0 ppid=3148 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:43.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962626264646461613266313661666132646534366538373662343663 May 15 18:04:43.148000 audit: BPF prog-id=132 op=UNLOAD May 15 18:04:43.148000 audit: BPF prog-id=131 op=UNLOAD May 15 18:04:43.148000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 18:04:43.148000 audit: BPF prog-id=133 op=LOAD May 15 18:04:43.148000 audit[3189]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000247f8 items=0 ppid=3148 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 18:04:43.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962626264646461613266313661666132646534366538373662343663 May 15 18:04:43.174773 env[1157]: time="2025-05-15T18:04:43.174721985Z" level=info msg="StartContainer for \"9bbbdddaa2f16afa2de46e876b46ca097464f0bacfc77f1cd8b66e7a669e8274\" returns successfully" May 15 18:04:43.547133 kubelet[1465]: I0515 18:04:43.546951 1465 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=33.982610014 podStartE2EDuration="34.546886826s" podCreationTimestamp="2025-05-15 18:04:09 +0000 UTC" firstStartedPulling="2025-05-15 18:04:42.443458559 +0000 UTC m=+94.820516142" lastFinishedPulling="2025-05-15 18:04:43.007735321 +0000 UTC m=+95.384792954" observedRunningTime="2025-05-15 18:04:43.543704959 +0000 UTC m=+95.920762612" watchObservedRunningTime="2025-05-15 18:04:43.546886826 +0000 UTC m=+95.923944459" May 15 18:04:43.612410 systemd-networkd[982]: cali5ec59c6bf6e: Gained IPv6LL May 15 18:04:43.615765 kubelet[1465]: E0515 18:04:43.615711 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:44.621694 kubelet[1465]: E0515 18:04:44.621628 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:45.623199 kubelet[1465]: E0515 18:04:45.623036 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:46.624431 kubelet[1465]: E0515 18:04:46.624251 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:47.625456 kubelet[1465]: E0515 18:04:47.625276 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:48.479890 kubelet[1465]: E0515 18:04:48.479686 1465 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:48.626060 kubelet[1465]: E0515 18:04:48.625889 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:49.194304 systemd[1]: run-containerd-runc-k8s.io-76415a5effde0ff6da0951d4e2a7d04c4b048a318ef4ffc3ee30a3fab3d52c09-runc.ePj0Xh.mount: Deactivated successfully. May 15 18:04:49.628801 kubelet[1465]: E0515 18:04:49.628014 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:50.629438 kubelet[1465]: E0515 18:04:50.629322 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:51.630634 kubelet[1465]: E0515 18:04:51.630497 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:52.631675 kubelet[1465]: E0515 18:04:52.631555 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:53.632603 kubelet[1465]: E0515 18:04:53.632474 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:54.633176 kubelet[1465]: E0515 18:04:54.633095 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:55.633680 kubelet[1465]: E0515 18:04:55.633626 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:56.634809 kubelet[1465]: E0515 18:04:56.634733 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:57.636363 kubelet[1465]: E0515 18:04:57.636298 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:58.638003 kubelet[1465]: E0515 18:04:58.637895 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:04:59.639178 kubelet[1465]: E0515 18:04:59.638974 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:00.639643 kubelet[1465]: E0515 18:05:00.639609 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:01.640989 kubelet[1465]: E0515 18:05:01.640817 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:02.642240 kubelet[1465]: E0515 18:05:02.642067 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:03.642832 kubelet[1465]: E0515 18:05:03.642770 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:04.644016 kubelet[1465]: E0515 18:05:04.643924 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:05.644402 kubelet[1465]: E0515 18:05:05.644272 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:06.645271 kubelet[1465]: E0515 18:05:06.645144 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:07.646831 kubelet[1465]: E0515 18:05:07.646644 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:08.479504 kubelet[1465]: E0515 18:05:08.479395 1465 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:08.647137 kubelet[1465]: E0515 18:05:08.647013 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:09.648060 kubelet[1465]: E0515 18:05:09.647878 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:10.648925 kubelet[1465]: E0515 18:05:10.648771 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:10.680681 update_engine[1148]: I0515 18:05:10.680229 1148 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs May 15 18:05:10.680681 update_engine[1148]: I0515 18:05:10.680480 1148 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs May 15 18:05:10.682979 update_engine[1148]: I0515 18:05:10.682920 1148 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs May 15 18:05:10.685672 update_engine[1148]: I0515 18:05:10.685526 1148 omaha_request_params.cc:62] Current group set to lts May 15 18:05:10.687657 update_engine[1148]: I0515 18:05:10.686540 1148 update_attempter.cc:499] Already updated boot flags. Skipping. May 15 18:05:10.687657 update_engine[1148]: I0515 18:05:10.686617 1148 update_attempter.cc:643] Scheduling an action processor start. May 15 18:05:10.687657 update_engine[1148]: I0515 18:05:10.686710 1148 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction May 15 18:05:10.687657 update_engine[1148]: I0515 18:05:10.686846 1148 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs May 15 18:05:10.687657 update_engine[1148]: I0515 18:05:10.687011 1148 omaha_request_action.cc:270] Posting an Omaha request to disabled May 15 18:05:10.687657 update_engine[1148]: I0515 18:05:10.687026 1148 omaha_request_action.cc:271] Request: May 15 18:05:10.687657 update_engine[1148]: May 15 18:05:10.687657 update_engine[1148]: May 15 18:05:10.687657 update_engine[1148]: May 15 18:05:10.687657 update_engine[1148]: May 15 18:05:10.687657 update_engine[1148]: May 15 18:05:10.687657 update_engine[1148]: May 15 18:05:10.687657 update_engine[1148]: May 15 18:05:10.687657 update_engine[1148]: May 15 18:05:10.687657 update_engine[1148]: I0515 18:05:10.687058 1148 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 15 18:05:10.692632 locksmithd[1195]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 May 15 18:05:10.701653 update_engine[1148]: I0515 18:05:10.701525 1148 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 15 18:05:10.702509 update_engine[1148]: E0515 18:05:10.702469 1148 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 15 18:05:10.702990 update_engine[1148]: I0515 18:05:10.702953 1148 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 May 15 18:05:11.650137 kubelet[1465]: E0515 18:05:11.650023 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:12.651379 kubelet[1465]: E0515 18:05:12.651258 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:13.652612 kubelet[1465]: E0515 18:05:13.652503 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:14.654297 kubelet[1465]: E0515 18:05:14.654232 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:15.655695 kubelet[1465]: E0515 18:05:15.655633 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:16.657506 kubelet[1465]: E0515 18:05:16.657313 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:17.670003 kubelet[1465]: E0515 18:05:17.669769 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:18.671358 kubelet[1465]: E0515 18:05:18.671295 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:19.177375 systemd[1]: run-containerd-runc-k8s.io-76415a5effde0ff6da0951d4e2a7d04c4b048a318ef4ffc3ee30a3fab3d52c09-runc.47DtAr.mount: Deactivated successfully. May 15 18:05:19.673509 kubelet[1465]: E0515 18:05:19.673380 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:20.674495 kubelet[1465]: E0515 18:05:20.674412 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:20.680250 update_engine[1148]: I0515 18:05:20.679647 1148 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 15 18:05:20.680250 update_engine[1148]: I0515 18:05:20.680083 1148 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 15 18:05:20.681014 update_engine[1148]: E0515 18:05:20.680327 1148 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 15 18:05:20.681014 update_engine[1148]: I0515 18:05:20.680478 1148 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 May 15 18:05:21.688398 kubelet[1465]: E0515 18:05:21.688316 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:22.689417 kubelet[1465]: E0515 18:05:22.689352 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:23.691199 kubelet[1465]: E0515 18:05:23.691136 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:24.693309 kubelet[1465]: E0515 18:05:24.693157 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:25.693474 kubelet[1465]: E0515 18:05:25.693379 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:26.694647 kubelet[1465]: E0515 18:05:26.694592 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:27.696791 kubelet[1465]: E0515 18:05:27.696639 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:28.479487 kubelet[1465]: E0515 18:05:28.479401 1465 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:28.696884 kubelet[1465]: E0515 18:05:28.696779 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:29.697900 kubelet[1465]: E0515 18:05:29.697822 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:30.680531 update_engine[1148]: I0515 18:05:30.679795 1148 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 15 18:05:30.680531 update_engine[1148]: I0515 18:05:30.680294 1148 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 15 18:05:30.680531 update_engine[1148]: E0515 18:05:30.680516 1148 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 15 18:05:30.681626 update_engine[1148]: I0515 18:05:30.680773 1148 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 May 15 18:05:30.699353 kubelet[1465]: E0515 18:05:30.699292 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:31.701358 kubelet[1465]: E0515 18:05:31.701274 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:32.703217 kubelet[1465]: E0515 18:05:32.703142 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:33.704650 kubelet[1465]: E0515 18:05:33.704532 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:34.706085 kubelet[1465]: E0515 18:05:34.705973 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:35.707048 kubelet[1465]: E0515 18:05:35.706899 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:36.707311 kubelet[1465]: E0515 18:05:36.707224 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:37.709186 kubelet[1465]: E0515 18:05:37.709039 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:38.709316 kubelet[1465]: E0515 18:05:38.709195 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:39.710155 kubelet[1465]: E0515 18:05:39.710054 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:40.670514 update_engine[1148]: I0515 18:05:40.670342 1148 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 15 18:05:40.671266 update_engine[1148]: I0515 18:05:40.670959 1148 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 15 18:05:40.671266 update_engine[1148]: E0515 18:05:40.671168 1148 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 15 18:05:40.671523 update_engine[1148]: I0515 18:05:40.671317 1148 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded May 15 18:05:40.671523 update_engine[1148]: I0515 18:05:40.671355 1148 omaha_request_action.cc:621] Omaha request response: May 15 18:05:40.671523 update_engine[1148]: E0515 18:05:40.671509 1148 omaha_request_action.cc:640] Omaha request network transfer failed. May 15 18:05:40.671923 update_engine[1148]: I0515 18:05:40.671625 1148 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. May 15 18:05:40.671923 update_engine[1148]: I0515 18:05:40.671639 1148 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 15 18:05:40.671923 update_engine[1148]: I0515 18:05:40.671650 1148 update_attempter.cc:306] Processing Done. May 15 18:05:40.671923 update_engine[1148]: E0515 18:05:40.671716 1148 update_attempter.cc:619] Update failed. May 15 18:05:40.671923 update_engine[1148]: I0515 18:05:40.671753 1148 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse May 15 18:05:40.671923 update_engine[1148]: I0515 18:05:40.671767 1148 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) May 15 18:05:40.671923 update_engine[1148]: I0515 18:05:40.671792 1148 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. May 15 18:05:40.672494 update_engine[1148]: I0515 18:05:40.671963 1148 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction May 15 18:05:40.672494 update_engine[1148]: I0515 18:05:40.672009 1148 omaha_request_action.cc:270] Posting an Omaha request to disabled May 15 18:05:40.672494 update_engine[1148]: I0515 18:05:40.672019 1148 omaha_request_action.cc:271] Request: May 15 18:05:40.672494 update_engine[1148]: May 15 18:05:40.672494 update_engine[1148]: May 15 18:05:40.672494 update_engine[1148]: May 15 18:05:40.672494 update_engine[1148]: May 15 18:05:40.672494 update_engine[1148]: May 15 18:05:40.672494 update_engine[1148]: May 15 18:05:40.672494 update_engine[1148]: I0515 18:05:40.672030 1148 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 15 18:05:40.672494 update_engine[1148]: I0515 18:05:40.672300 1148 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 15 18:05:40.672494 update_engine[1148]: E0515 18:05:40.672457 1148 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 15 18:05:40.673507 update_engine[1148]: I0515 18:05:40.672648 1148 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded May 15 18:05:40.673507 update_engine[1148]: I0515 18:05:40.672668 1148 omaha_request_action.cc:621] Omaha request response: May 15 18:05:40.673507 update_engine[1148]: I0515 18:05:40.672678 1148 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 15 18:05:40.673507 update_engine[1148]: I0515 18:05:40.672686 1148 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 15 18:05:40.673507 update_engine[1148]: I0515 18:05:40.672694 1148 update_attempter.cc:306] Processing Done. May 15 18:05:40.673507 update_engine[1148]: I0515 18:05:40.672703 1148 update_attempter.cc:310] Error event sent. May 15 18:05:40.673507 update_engine[1148]: I0515 18:05:40.672749 1148 update_check_scheduler.cc:74] Next update check in 47m14s May 15 18:05:40.676022 locksmithd[1195]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 May 15 18:05:40.676873 locksmithd[1195]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 May 15 18:05:40.711361 kubelet[1465]: E0515 18:05:40.711260 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:41.711917 kubelet[1465]: E0515 18:05:41.711841 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:42.713240 kubelet[1465]: E0515 18:05:42.713124 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:43.714179 kubelet[1465]: E0515 18:05:43.714039 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:44.715239 kubelet[1465]: E0515 18:05:44.715153 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:45.717685 kubelet[1465]: E0515 18:05:45.717590 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:46.718841 kubelet[1465]: E0515 18:05:46.718767 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:47.720325 kubelet[1465]: E0515 18:05:47.720257 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:48.479963 kubelet[1465]: E0515 18:05:48.479883 1465 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:48.721628 kubelet[1465]: E0515 18:05:48.721454 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:49.174503 systemd[1]: run-containerd-runc-k8s.io-76415a5effde0ff6da0951d4e2a7d04c4b048a318ef4ffc3ee30a3fab3d52c09-runc.03y1De.mount: Deactivated successfully. May 15 18:05:49.723122 kubelet[1465]: E0515 18:05:49.722912 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:50.724941 kubelet[1465]: E0515 18:05:50.724785 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:51.725069 kubelet[1465]: E0515 18:05:51.724999 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:52.726790 kubelet[1465]: E0515 18:05:52.726682 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:53.727405 kubelet[1465]: E0515 18:05:53.727294 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:54.728501 kubelet[1465]: E0515 18:05:54.728406 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:55.729367 kubelet[1465]: E0515 18:05:55.729297 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:56.730255 kubelet[1465]: E0515 18:05:56.730180 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:57.731878 kubelet[1465]: E0515 18:05:57.731805 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:58.733718 kubelet[1465]: E0515 18:05:58.733648 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:05:59.733957 kubelet[1465]: E0515 18:05:59.733862 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:00.735784 kubelet[1465]: E0515 18:06:00.735696 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:01.737814 kubelet[1465]: E0515 18:06:01.737663 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:02.738717 kubelet[1465]: E0515 18:06:02.738523 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:03.739883 kubelet[1465]: E0515 18:06:03.739742 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:04.740910 kubelet[1465]: E0515 18:06:04.740828 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:05.741423 kubelet[1465]: E0515 18:06:05.741338 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:06.743442 kubelet[1465]: E0515 18:06:06.743308 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:07.744169 kubelet[1465]: E0515 18:06:07.744100 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:08.479780 kubelet[1465]: E0515 18:06:08.479693 1465 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:08.745762 kubelet[1465]: E0515 18:06:08.745525 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:09.746789 kubelet[1465]: E0515 18:06:09.746656 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:10.747901 kubelet[1465]: E0515 18:06:10.747826 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:11.749460 kubelet[1465]: E0515 18:06:11.749304 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:12.750114 kubelet[1465]: E0515 18:06:12.750048 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:13.751798 kubelet[1465]: E0515 18:06:13.751682 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:14.752937 kubelet[1465]: E0515 18:06:14.752854 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:15.753502 kubelet[1465]: E0515 18:06:15.753404 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:16.755709 kubelet[1465]: E0515 18:06:16.755626 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:17.756943 kubelet[1465]: E0515 18:06:17.756839 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:18.759264 kubelet[1465]: E0515 18:06:18.759199 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:19.760704 kubelet[1465]: E0515 18:06:19.760596 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:20.762077 kubelet[1465]: E0515 18:06:20.761391 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:21.762064 kubelet[1465]: E0515 18:06:21.761940 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:22.763197 kubelet[1465]: E0515 18:06:22.763127 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:23.765037 kubelet[1465]: E0515 18:06:23.764871 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:24.766134 kubelet[1465]: E0515 18:06:24.766032 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:25.767374 kubelet[1465]: E0515 18:06:25.767199 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:26.767959 kubelet[1465]: E0515 18:06:26.767882 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:27.768928 kubelet[1465]: E0515 18:06:27.768860 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:28.480087 kubelet[1465]: E0515 18:06:28.480002 1465 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:28.770822 kubelet[1465]: E0515 18:06:28.770597 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:29.771019 kubelet[1465]: E0515 18:06:29.770948 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:30.772922 kubelet[1465]: E0515 18:06:30.772751 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:31.774125 kubelet[1465]: E0515 18:06:31.774040 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:32.774733 kubelet[1465]: E0515 18:06:32.774634 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:33.775914 kubelet[1465]: E0515 18:06:33.775846 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:34.777732 kubelet[1465]: E0515 18:06:34.777638 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:35.778776 kubelet[1465]: E0515 18:06:35.778657 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:36.779591 kubelet[1465]: E0515 18:06:36.779462 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:37.781698 kubelet[1465]: E0515 18:06:37.781498 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:38.783030 kubelet[1465]: E0515 18:06:38.782790 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:39.784818 kubelet[1465]: E0515 18:06:39.784641 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:40.785092 kubelet[1465]: E0515 18:06:40.784988 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:41.786338 kubelet[1465]: E0515 18:06:41.786199 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:42.787349 kubelet[1465]: E0515 18:06:42.787253 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:43.788615 kubelet[1465]: E0515 18:06:43.788447 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:44.788813 kubelet[1465]: E0515 18:06:44.788736 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:45.790429 kubelet[1465]: E0515 18:06:45.790314 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:46.791679 kubelet[1465]: E0515 18:06:46.791472 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:47.792248 kubelet[1465]: E0515 18:06:47.792143 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:48.480218 kubelet[1465]: E0515 18:06:48.480133 1465 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:48.793889 kubelet[1465]: E0515 18:06:48.793485 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:49.794502 kubelet[1465]: E0515 18:06:49.794405 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:50.795928 kubelet[1465]: E0515 18:06:50.795750 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:51.796690 kubelet[1465]: E0515 18:06:51.796517 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:52.797771 kubelet[1465]: E0515 18:06:52.797674 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:53.798108 kubelet[1465]: E0515 18:06:53.797987 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:54.799152 kubelet[1465]: E0515 18:06:54.799076 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:55.800653 kubelet[1465]: E0515 18:06:55.800344 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:56.802721 kubelet[1465]: E0515 18:06:56.802628 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:57.804984 kubelet[1465]: E0515 18:06:57.804901 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:58.806146 kubelet[1465]: E0515 18:06:58.805994 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:06:59.807285 kubelet[1465]: E0515 18:06:59.807099 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:07:00.809210 kubelet[1465]: E0515 18:07:00.809028 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:07:01.810050 kubelet[1465]: E0515 18:07:01.809612 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:07:02.811107 kubelet[1465]: E0515 18:07:02.810979 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 18:07:03.811652 kubelet[1465]: E0515 18:07:03.811598 1465 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"