May 10 00:50:08.984635 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 9 23:12:23 -00 2025 May 10 00:50:08.984668 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:50:08.984688 kernel: BIOS-provided physical RAM map: May 10 00:50:08.984699 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 10 00:50:08.984710 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000786cdfff] usable May 10 00:50:08.984722 kernel: BIOS-e820: [mem 0x00000000786ce000-0x000000007894dfff] reserved May 10 00:50:08.984736 kernel: BIOS-e820: [mem 0x000000007894e000-0x000000007895dfff] ACPI data May 10 00:50:08.984748 kernel: BIOS-e820: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS May 10 00:50:08.984761 kernel: BIOS-e820: [mem 0x00000000789de000-0x000000007c97bfff] usable May 10 00:50:08.984773 kernel: BIOS-e820: [mem 0x000000007c97c000-0x000000007c9fffff] reserved May 10 00:50:08.984785 kernel: NX (Execute Disable) protection: active May 10 00:50:08.984796 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable May 10 00:50:08.984808 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable May 10 00:50:08.984820 kernel: extended physical RAM map: May 10 00:50:08.984837 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 10 00:50:08.984850 kernel: reserve setup_data: [mem 0x0000000000100000-0x0000000076813017] usable May 10 00:50:08.984863 kernel: reserve setup_data: [mem 0x0000000076813018-0x000000007681be57] usable May 10 00:50:08.984876 kernel: reserve setup_data: [mem 0x000000007681be58-0x00000000786cdfff] usable May 10 00:50:08.984888 kernel: reserve setup_data: [mem 0x00000000786ce000-0x000000007894dfff] reserved May 10 00:50:08.984901 kernel: reserve setup_data: [mem 0x000000007894e000-0x000000007895dfff] ACPI data May 10 00:50:08.984913 kernel: reserve setup_data: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS May 10 00:50:08.984926 kernel: reserve setup_data: [mem 0x00000000789de000-0x000000007c97bfff] usable May 10 00:50:08.984939 kernel: reserve setup_data: [mem 0x000000007c97c000-0x000000007c9fffff] reserved May 10 00:50:08.984951 kernel: efi: EFI v2.70 by EDK II May 10 00:50:08.984966 kernel: efi: SMBIOS=0x7886a000 ACPI=0x7895d000 ACPI 2.0=0x7895d014 MEMATTR=0x77004a98 May 10 00:50:08.984979 kernel: SMBIOS 2.7 present. May 10 00:50:08.984991 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 May 10 00:50:08.985003 kernel: Hypervisor detected: KVM May 10 00:50:08.985016 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 10 00:50:08.985028 kernel: kvm-clock: cpu 0, msr 4d196001, primary cpu clock May 10 00:50:08.985040 kernel: kvm-clock: using sched offset of 4128404028 cycles May 10 00:50:08.985054 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 10 00:50:08.985067 kernel: tsc: Detected 2499.996 MHz processor May 10 00:50:08.985080 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 10 00:50:08.985093 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 10 00:50:08.985109 kernel: last_pfn = 0x7c97c max_arch_pfn = 0x400000000 May 10 00:50:08.985122 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 10 00:50:08.985135 kernel: Using GB pages for direct mapping May 10 00:50:08.985147 kernel: Secure boot disabled May 10 00:50:08.985161 kernel: ACPI: Early table checksum verification disabled May 10 00:50:08.985179 kernel: ACPI: RSDP 0x000000007895D014 000024 (v02 AMAZON) May 10 00:50:08.985193 kernel: ACPI: XSDT 0x000000007895C0E8 00006C (v01 AMAZON AMZNFACP 00000001 01000013) May 10 00:50:08.985209 kernel: ACPI: FACP 0x0000000078955000 000114 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) May 10 00:50:08.985231 kernel: ACPI: DSDT 0x0000000078956000 00115A (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) May 10 00:50:08.985245 kernel: ACPI: FACS 0x00000000789D0000 000040 May 10 00:50:08.985259 kernel: ACPI: WAET 0x000000007895B000 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) May 10 00:50:08.985273 kernel: ACPI: SLIT 0x000000007895A000 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) May 10 00:50:08.985287 kernel: ACPI: APIC 0x0000000078959000 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) May 10 00:50:08.985301 kernel: ACPI: SRAT 0x0000000078958000 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) May 10 00:50:08.985318 kernel: ACPI: HPET 0x0000000078954000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) May 10 00:50:08.985332 kernel: ACPI: SSDT 0x0000000078953000 000759 (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) May 10 00:50:08.985346 kernel: ACPI: SSDT 0x0000000078952000 00007F (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) May 10 00:50:08.985360 kernel: ACPI: BGRT 0x0000000078951000 000038 (v01 AMAZON AMAZON 00000002 01000013) May 10 00:50:08.985374 kernel: ACPI: Reserving FACP table memory at [mem 0x78955000-0x78955113] May 10 00:50:08.985388 kernel: ACPI: Reserving DSDT table memory at [mem 0x78956000-0x78957159] May 10 00:50:08.985402 kernel: ACPI: Reserving FACS table memory at [mem 0x789d0000-0x789d003f] May 10 00:50:08.985417 kernel: ACPI: Reserving WAET table memory at [mem 0x7895b000-0x7895b027] May 10 00:50:08.985431 kernel: ACPI: Reserving SLIT table memory at [mem 0x7895a000-0x7895a06b] May 10 00:50:08.985448 kernel: ACPI: Reserving APIC table memory at [mem 0x78959000-0x78959075] May 10 00:50:08.985461 kernel: ACPI: Reserving SRAT table memory at [mem 0x78958000-0x7895809f] May 10 00:50:08.985475 kernel: ACPI: Reserving HPET table memory at [mem 0x78954000-0x78954037] May 10 00:50:08.985489 kernel: ACPI: Reserving SSDT table memory at [mem 0x78953000-0x78953758] May 10 00:50:08.985502 kernel: ACPI: Reserving SSDT table memory at [mem 0x78952000-0x7895207e] May 10 00:50:08.985517 kernel: ACPI: Reserving BGRT table memory at [mem 0x78951000-0x78951037] May 10 00:50:08.985530 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 10 00:50:08.985545 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 10 00:50:08.985559 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] May 10 00:50:08.985575 kernel: NUMA: Initialized distance table, cnt=1 May 10 00:50:08.985599 kernel: NODE_DATA(0) allocated [mem 0x7a8ef000-0x7a8f4fff] May 10 00:50:08.985614 kernel: Zone ranges: May 10 00:50:08.985628 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 10 00:50:08.985641 kernel: DMA32 [mem 0x0000000001000000-0x000000007c97bfff] May 10 00:50:08.985655 kernel: Normal empty May 10 00:50:08.985669 kernel: Movable zone start for each node May 10 00:50:08.985683 kernel: Early memory node ranges May 10 00:50:08.985697 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 10 00:50:08.985713 kernel: node 0: [mem 0x0000000000100000-0x00000000786cdfff] May 10 00:50:08.985728 kernel: node 0: [mem 0x00000000789de000-0x000000007c97bfff] May 10 00:50:08.985741 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007c97bfff] May 10 00:50:08.985755 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 00:50:08.985769 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 10 00:50:08.985783 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 10 00:50:08.985798 kernel: On node 0, zone DMA32: 13956 pages in unavailable ranges May 10 00:50:08.985811 kernel: ACPI: PM-Timer IO Port: 0xb008 May 10 00:50:08.985825 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 10 00:50:08.985842 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 May 10 00:50:08.985856 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 10 00:50:08.985870 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 10 00:50:08.985883 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 10 00:50:08.985897 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 10 00:50:08.985911 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 10 00:50:08.985925 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 10 00:50:08.985939 kernel: TSC deadline timer available May 10 00:50:08.985953 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 10 00:50:08.985967 kernel: [mem 0x7ca00000-0xffffffff] available for PCI devices May 10 00:50:08.985982 kernel: Booting paravirtualized kernel on KVM May 10 00:50:08.985996 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 10 00:50:08.986010 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 10 00:50:08.986024 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 10 00:50:08.986038 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 10 00:50:08.986052 kernel: pcpu-alloc: [0] 0 1 May 10 00:50:08.986066 kernel: kvm-guest: stealtime: cpu 0, msr 7a41c0c0 May 10 00:50:08.986080 kernel: kvm-guest: PV spinlocks enabled May 10 00:50:08.986094 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 10 00:50:08.986111 kernel: Built 1 zonelists, mobility grouping on. Total pages: 501318 May 10 00:50:08.986124 kernel: Policy zone: DMA32 May 10 00:50:08.986140 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:50:08.986155 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 10 00:50:08.986169 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 10 00:50:08.986183 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 10 00:50:08.986198 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 10 00:50:08.986215 kernel: Memory: 1876640K/2037804K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 160904K reserved, 0K cma-reserved) May 10 00:50:08.986229 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 10 00:50:08.986243 kernel: Kernel/User page tables isolation: enabled May 10 00:50:08.986256 kernel: ftrace: allocating 34584 entries in 136 pages May 10 00:50:08.986271 kernel: ftrace: allocated 136 pages with 2 groups May 10 00:50:08.986284 kernel: rcu: Hierarchical RCU implementation. May 10 00:50:08.986300 kernel: rcu: RCU event tracing is enabled. May 10 00:50:08.986327 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 10 00:50:08.986342 kernel: Rude variant of Tasks RCU enabled. May 10 00:50:08.986356 kernel: Tracing variant of Tasks RCU enabled. May 10 00:50:08.986371 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 10 00:50:08.986386 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 10 00:50:08.986403 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 10 00:50:08.986418 kernel: random: crng init done May 10 00:50:08.986432 kernel: Console: colour dummy device 80x25 May 10 00:50:08.986446 kernel: printk: console [tty0] enabled May 10 00:50:08.986460 kernel: printk: console [ttyS0] enabled May 10 00:50:08.986475 kernel: ACPI: Core revision 20210730 May 10 00:50:08.986490 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns May 10 00:50:08.986509 kernel: APIC: Switch to symmetric I/O mode setup May 10 00:50:08.986524 kernel: x2apic enabled May 10 00:50:08.986538 kernel: Switched APIC routing to physical x2apic. May 10 00:50:08.986553 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns May 10 00:50:08.986568 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499996) May 10 00:50:08.986584 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 10 00:50:08.986613 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 10 00:50:08.986626 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 10 00:50:08.986637 kernel: Spectre V2 : Mitigation: Retpolines May 10 00:50:08.986649 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 10 00:50:08.986661 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! May 10 00:50:08.986675 kernel: RETBleed: Vulnerable May 10 00:50:08.986689 kernel: Speculative Store Bypass: Vulnerable May 10 00:50:08.986704 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode May 10 00:50:08.986718 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 10 00:50:08.986733 kernel: GDS: Unknown: Dependent on hypervisor status May 10 00:50:08.986747 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 10 00:50:08.986761 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 10 00:50:08.986779 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 10 00:50:08.986794 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' May 10 00:50:08.986808 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' May 10 00:50:08.986823 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' May 10 00:50:08.986837 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' May 10 00:50:08.986852 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' May 10 00:50:08.986866 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' May 10 00:50:08.986881 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 10 00:50:08.986896 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 May 10 00:50:08.986910 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 May 10 00:50:08.986925 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 May 10 00:50:08.986942 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 May 10 00:50:08.986956 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 May 10 00:50:08.986971 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 May 10 00:50:08.986986 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. May 10 00:50:08.987000 kernel: Freeing SMP alternatives memory: 32K May 10 00:50:08.987015 kernel: pid_max: default: 32768 minimum: 301 May 10 00:50:08.987029 kernel: LSM: Security Framework initializing May 10 00:50:08.987044 kernel: SELinux: Initializing. May 10 00:50:08.987058 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 10 00:50:08.987072 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 10 00:50:08.987087 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) May 10 00:50:08.987104 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. May 10 00:50:08.987119 kernel: signal: max sigframe size: 3632 May 10 00:50:08.987134 kernel: rcu: Hierarchical SRCU implementation. May 10 00:50:08.987149 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 10 00:50:08.987163 kernel: smp: Bringing up secondary CPUs ... May 10 00:50:08.987178 kernel: x86: Booting SMP configuration: May 10 00:50:08.987193 kernel: .... node #0, CPUs: #1 May 10 00:50:08.987208 kernel: kvm-clock: cpu 1, msr 4d196041, secondary cpu clock May 10 00:50:08.987223 kernel: kvm-guest: stealtime: cpu 1, msr 7a51c0c0 May 10 00:50:08.987238 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. May 10 00:50:08.987257 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. May 10 00:50:08.987272 kernel: smp: Brought up 1 node, 2 CPUs May 10 00:50:08.987286 kernel: smpboot: Max logical packages: 1 May 10 00:50:08.987302 kernel: smpboot: Total of 2 processors activated (9999.98 BogoMIPS) May 10 00:50:08.987317 kernel: devtmpfs: initialized May 10 00:50:08.987332 kernel: x86/mm: Memory block size: 128MB May 10 00:50:08.987346 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7895e000-0x789ddfff] (524288 bytes) May 10 00:50:08.987361 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 10 00:50:08.987378 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 10 00:50:08.987393 kernel: pinctrl core: initialized pinctrl subsystem May 10 00:50:08.987408 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 10 00:50:08.987423 kernel: audit: initializing netlink subsys (disabled) May 10 00:50:08.987438 kernel: audit: type=2000 audit(1746838209.345:1): state=initialized audit_enabled=0 res=1 May 10 00:50:08.987452 kernel: thermal_sys: Registered thermal governor 'step_wise' May 10 00:50:08.987467 kernel: thermal_sys: Registered thermal governor 'user_space' May 10 00:50:08.987482 kernel: cpuidle: using governor menu May 10 00:50:08.987497 kernel: ACPI: bus type PCI registered May 10 00:50:08.987514 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 10 00:50:08.987529 kernel: dca service started, version 1.12.1 May 10 00:50:08.987544 kernel: PCI: Using configuration type 1 for base access May 10 00:50:08.987559 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 10 00:50:08.987574 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 10 00:50:08.987603 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 10 00:50:08.987617 kernel: ACPI: Added _OSI(Module Device) May 10 00:50:08.987631 kernel: ACPI: Added _OSI(Processor Device) May 10 00:50:08.987644 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 10 00:50:08.987660 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 10 00:50:08.987675 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 10 00:50:08.987690 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 10 00:50:08.987705 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 10 00:50:08.987720 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded May 10 00:50:08.987734 kernel: ACPI: Interpreter enabled May 10 00:50:08.987749 kernel: ACPI: PM: (supports S0 S5) May 10 00:50:08.987764 kernel: ACPI: Using IOAPIC for interrupt routing May 10 00:50:08.987779 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 10 00:50:08.987796 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 10 00:50:08.987811 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 10 00:50:08.988020 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 10 00:50:08.988152 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 10 00:50:08.988173 kernel: acpiphp: Slot [3] registered May 10 00:50:08.988189 kernel: acpiphp: Slot [4] registered May 10 00:50:08.988203 kernel: acpiphp: Slot [5] registered May 10 00:50:08.988222 kernel: acpiphp: Slot [6] registered May 10 00:50:08.988237 kernel: acpiphp: Slot [7] registered May 10 00:50:08.988252 kernel: acpiphp: Slot [8] registered May 10 00:50:08.988267 kernel: acpiphp: Slot [9] registered May 10 00:50:08.988282 kernel: acpiphp: Slot [10] registered May 10 00:50:08.988297 kernel: acpiphp: Slot [11] registered May 10 00:50:08.988312 kernel: acpiphp: Slot [12] registered May 10 00:50:08.988327 kernel: acpiphp: Slot [13] registered May 10 00:50:08.988341 kernel: acpiphp: Slot [14] registered May 10 00:50:08.988356 kernel: acpiphp: Slot [15] registered May 10 00:50:08.988372 kernel: acpiphp: Slot [16] registered May 10 00:50:08.988387 kernel: acpiphp: Slot [17] registered May 10 00:50:08.988402 kernel: acpiphp: Slot [18] registered May 10 00:50:08.988417 kernel: acpiphp: Slot [19] registered May 10 00:50:08.988432 kernel: acpiphp: Slot [20] registered May 10 00:50:08.988447 kernel: acpiphp: Slot [21] registered May 10 00:50:08.988461 kernel: acpiphp: Slot [22] registered May 10 00:50:08.988476 kernel: acpiphp: Slot [23] registered May 10 00:50:08.988491 kernel: acpiphp: Slot [24] registered May 10 00:50:08.988509 kernel: acpiphp: Slot [25] registered May 10 00:50:08.988523 kernel: acpiphp: Slot [26] registered May 10 00:50:08.988538 kernel: acpiphp: Slot [27] registered May 10 00:50:08.988552 kernel: acpiphp: Slot [28] registered May 10 00:50:08.988567 kernel: acpiphp: Slot [29] registered May 10 00:50:08.988582 kernel: acpiphp: Slot [30] registered May 10 00:50:08.988614 kernel: acpiphp: Slot [31] registered May 10 00:50:08.988626 kernel: PCI host bridge to bus 0000:00 May 10 00:50:08.988759 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 10 00:50:08.988879 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 10 00:50:08.988991 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 10 00:50:08.989102 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] May 10 00:50:08.989211 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x2000ffffffff window] May 10 00:50:08.989330 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 10 00:50:08.989470 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 10 00:50:08.989625 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 10 00:50:08.989766 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 May 10 00:50:08.989889 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI May 10 00:50:08.990010 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff May 10 00:50:08.990129 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff May 10 00:50:08.990251 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff May 10 00:50:08.990371 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff May 10 00:50:08.990499 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff May 10 00:50:08.990633 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff May 10 00:50:08.990765 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 May 10 00:50:08.990888 kernel: pci 0000:00:03.0: reg 0x10: [mem 0x80000000-0x803fffff pref] May 10 00:50:08.991007 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 10 00:50:08.991126 kernel: pci 0000:00:03.0: BAR 0: assigned to efifb May 10 00:50:08.991245 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 10 00:50:08.991378 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 May 10 00:50:08.991499 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80404000-0x80407fff] May 10 00:50:08.995669 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 May 10 00:50:08.995861 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80400000-0x80403fff] May 10 00:50:08.995883 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 10 00:50:08.995897 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 10 00:50:08.995912 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 10 00:50:08.995933 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 10 00:50:08.995945 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 10 00:50:08.995960 kernel: iommu: Default domain type: Translated May 10 00:50:08.995973 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 10 00:50:08.996105 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device May 10 00:50:08.996233 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 10 00:50:08.996359 kernel: pci 0000:00:03.0: vgaarb: bridge control possible May 10 00:50:08.996379 kernel: vgaarb: loaded May 10 00:50:08.996394 kernel: pps_core: LinuxPPS API ver. 1 registered May 10 00:50:08.996413 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 10 00:50:08.996427 kernel: PTP clock support registered May 10 00:50:08.996442 kernel: Registered efivars operations May 10 00:50:08.996457 kernel: PCI: Using ACPI for IRQ routing May 10 00:50:08.996472 kernel: PCI: pci_cache_line_size set to 64 bytes May 10 00:50:08.996487 kernel: e820: reserve RAM buffer [mem 0x76813018-0x77ffffff] May 10 00:50:08.996501 kernel: e820: reserve RAM buffer [mem 0x786ce000-0x7bffffff] May 10 00:50:08.996516 kernel: e820: reserve RAM buffer [mem 0x7c97c000-0x7fffffff] May 10 00:50:08.996530 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 May 10 00:50:08.996548 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter May 10 00:50:08.996562 kernel: clocksource: Switched to clocksource kvm-clock May 10 00:50:08.996577 kernel: VFS: Disk quotas dquot_6.6.0 May 10 00:50:08.996605 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 10 00:50:08.996620 kernel: pnp: PnP ACPI init May 10 00:50:08.996634 kernel: pnp: PnP ACPI: found 5 devices May 10 00:50:08.996649 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 10 00:50:08.996664 kernel: NET: Registered PF_INET protocol family May 10 00:50:08.996679 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 10 00:50:08.996697 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 10 00:50:08.996712 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 10 00:50:08.996727 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 10 00:50:08.996742 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 10 00:50:08.996757 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 10 00:50:08.996772 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 10 00:50:08.996787 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 10 00:50:08.996802 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 10 00:50:08.996817 kernel: NET: Registered PF_XDP protocol family May 10 00:50:08.996943 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 10 00:50:08.997058 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 10 00:50:08.997171 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 10 00:50:08.997294 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] May 10 00:50:08.997404 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x2000ffffffff window] May 10 00:50:08.997534 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 10 00:50:08.997676 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 10 00:50:08.997699 kernel: PCI: CLS 0 bytes, default 64 May 10 00:50:08.997715 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 10 00:50:08.997731 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns May 10 00:50:08.997745 kernel: clocksource: Switched to clocksource tsc May 10 00:50:08.997760 kernel: Initialise system trusted keyrings May 10 00:50:08.997775 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 10 00:50:08.997789 kernel: Key type asymmetric registered May 10 00:50:08.997804 kernel: Asymmetric key parser 'x509' registered May 10 00:50:08.997819 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 10 00:50:08.997836 kernel: io scheduler mq-deadline registered May 10 00:50:08.997851 kernel: io scheduler kyber registered May 10 00:50:08.997865 kernel: io scheduler bfq registered May 10 00:50:08.997880 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 10 00:50:08.997894 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 10 00:50:08.997910 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 10 00:50:08.997925 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 10 00:50:08.997939 kernel: i8042: Warning: Keylock active May 10 00:50:08.997954 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 10 00:50:08.997971 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 10 00:50:08.998103 kernel: rtc_cmos 00:00: RTC can wake from S4 May 10 00:50:08.998226 kernel: rtc_cmos 00:00: registered as rtc0 May 10 00:50:08.998340 kernel: rtc_cmos 00:00: setting system clock to 2025-05-10T00:50:08 UTC (1746838208) May 10 00:50:08.998452 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram May 10 00:50:08.998469 kernel: intel_pstate: CPU model not supported May 10 00:50:08.998483 kernel: efifb: probing for efifb May 10 00:50:08.998498 kernel: efifb: framebuffer at 0x80000000, using 1876k, total 1875k May 10 00:50:08.998515 kernel: efifb: mode is 800x600x32, linelength=3200, pages=1 May 10 00:50:08.998530 kernel: efifb: scrolling: redraw May 10 00:50:08.998544 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 10 00:50:08.998558 kernel: Console: switching to colour frame buffer device 100x37 May 10 00:50:08.998572 kernel: fb0: EFI VGA frame buffer device May 10 00:50:08.998609 kernel: pstore: Registered efi as persistent store backend May 10 00:50:08.998647 kernel: NET: Registered PF_INET6 protocol family May 10 00:50:08.998664 kernel: Segment Routing with IPv6 May 10 00:50:08.998679 kernel: In-situ OAM (IOAM) with IPv6 May 10 00:50:08.998697 kernel: NET: Registered PF_PACKET protocol family May 10 00:50:08.998711 kernel: Key type dns_resolver registered May 10 00:50:08.998724 kernel: IPI shorthand broadcast: enabled May 10 00:50:08.998739 kernel: sched_clock: Marking stable (369038106, 131503888)->(578424263, -77882269) May 10 00:50:08.998754 kernel: registered taskstats version 1 May 10 00:50:08.998768 kernel: Loading compiled-in X.509 certificates May 10 00:50:08.998783 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 0c62a22cd9157131d2e97d5a2e1bd9023e187117' May 10 00:50:08.998797 kernel: Key type .fscrypt registered May 10 00:50:08.998811 kernel: Key type fscrypt-provisioning registered May 10 00:50:08.998828 kernel: pstore: Using crash dump compression: deflate May 10 00:50:08.998842 kernel: ima: No TPM chip found, activating TPM-bypass! May 10 00:50:08.998857 kernel: ima: Allocated hash algorithm: sha1 May 10 00:50:08.998874 kernel: ima: No architecture policies found May 10 00:50:08.998888 kernel: clk: Disabling unused clocks May 10 00:50:08.998902 kernel: Freeing unused kernel image (initmem) memory: 47456K May 10 00:50:08.998917 kernel: Write protecting the kernel read-only data: 28672k May 10 00:50:08.998931 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 10 00:50:08.998946 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 10 00:50:08.998962 kernel: Run /init as init process May 10 00:50:08.998977 kernel: with arguments: May 10 00:50:08.998991 kernel: /init May 10 00:50:08.999004 kernel: with environment: May 10 00:50:08.999019 kernel: HOME=/ May 10 00:50:08.999033 kernel: TERM=linux May 10 00:50:08.999047 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 10 00:50:08.999065 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:50:08.999085 systemd[1]: Detected virtualization amazon. May 10 00:50:08.999100 systemd[1]: Detected architecture x86-64. May 10 00:50:08.999114 systemd[1]: Running in initrd. May 10 00:50:08.999129 systemd[1]: No hostname configured, using default hostname. May 10 00:50:08.999143 systemd[1]: Hostname set to . May 10 00:50:08.999158 systemd[1]: Initializing machine ID from VM UUID. May 10 00:50:08.999173 systemd[1]: Queued start job for default target initrd.target. May 10 00:50:08.999188 systemd[1]: Started systemd-ask-password-console.path. May 10 00:50:08.999205 systemd[1]: Reached target cryptsetup.target. May 10 00:50:08.999220 systemd[1]: Reached target paths.target. May 10 00:50:08.999235 systemd[1]: Reached target slices.target. May 10 00:50:08.999249 systemd[1]: Reached target swap.target. May 10 00:50:08.999266 systemd[1]: Reached target timers.target. May 10 00:50:08.999284 systemd[1]: Listening on iscsid.socket. May 10 00:50:08.999299 systemd[1]: Listening on iscsiuio.socket. May 10 00:50:08.999314 systemd[1]: Listening on systemd-journald-audit.socket. May 10 00:50:08.999329 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 00:50:08.999344 systemd[1]: Listening on systemd-journald.socket. May 10 00:50:08.999359 systemd[1]: Listening on systemd-networkd.socket. May 10 00:50:08.999374 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:50:08.999389 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:50:08.999407 systemd[1]: Reached target sockets.target. May 10 00:50:08.999422 systemd[1]: Starting kmod-static-nodes.service... May 10 00:50:08.999437 systemd[1]: Finished network-cleanup.service. May 10 00:50:08.999452 systemd[1]: Starting systemd-fsck-usr.service... May 10 00:50:08.999467 systemd[1]: Starting systemd-journald.service... May 10 00:50:08.999481 systemd[1]: Starting systemd-modules-load.service... May 10 00:50:08.999496 systemd[1]: Starting systemd-resolved.service... May 10 00:50:08.999511 systemd[1]: Starting systemd-vconsole-setup.service... May 10 00:50:08.999525 systemd[1]: Finished kmod-static-nodes.service. May 10 00:50:08.999542 kernel: audit: type=1130 audit(1746838208.987:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:08.999564 systemd-journald[185]: Journal started May 10 00:50:08.999655 systemd-journald[185]: Runtime Journal (/run/log/journal/ec2c5b6176c5f5abb19064b8ddce942b) is 4.8M, max 38.3M, 33.5M free. May 10 00:50:08.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:08.995799 systemd-modules-load[186]: Inserted module 'overlay' May 10 00:50:09.004651 systemd[1]: Started systemd-journald.service. May 10 00:50:09.005136 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 10 00:50:09.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:09.016275 systemd[1]: Finished systemd-fsck-usr.service. May 10 00:50:09.024156 kernel: audit: type=1130 audit(1746838209.014:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:09.025930 systemd[1]: Finished systemd-vconsole-setup.service. May 10 00:50:09.030223 systemd[1]: Starting dracut-cmdline-ask.service... May 10 00:50:09.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:09.042309 kernel: audit: type=1130 audit(1746838209.024:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:09.043866 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:50:09.063625 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 10 00:50:09.059112 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:50:09.094475 kernel: Bridge firewalling registered May 10 00:50:09.094508 kernel: audit: type=1130 audit(1746838209.025:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:09.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:09.067077 systemd-modules-load[186]: Inserted module 'br_netfilter' May 10 00:50:09.087696 systemd-resolved[187]: Positive Trust Anchors: May 10 00:50:09.087711 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:50:09.122248 kernel: SCSI subsystem initialized May 10 00:50:09.122284 kernel: audit: type=1130 audit(1746838209.100:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:09.122305 kernel: audit: type=1130 audit(1746838209.110:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:09.122324 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 10 00:50:09.122353 kernel: device-mapper: uevent: version 1.0.3 May 10 00:50:09.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:09.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:09.087768 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:50:09.132893 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 10 00:50:09.091752 systemd-resolved[187]: Defaulting to hostname 'linux'. May 10 00:50:09.139465 kernel: audit: type=1130 audit(1746838209.132:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:09.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:09.101744 systemd[1]: Started systemd-resolved.service. May 10 00:50:09.146109 kernel: audit: type=1130 audit(1746838209.138:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:09.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:09.112346 systemd[1]: Finished dracut-cmdline-ask.service. May 10 00:50:09.128217 systemd-modules-load[186]: Inserted module 'dm_multipath' May 10 00:50:09.134008 systemd[1]: Finished systemd-modules-load.service. May 10 00:50:09.140469 systemd[1]: Reached target nss-lookup.target. May 10 00:50:09.148131 systemd[1]: Starting dracut-cmdline.service... May 10 00:50:09.157087 systemd[1]: Starting systemd-sysctl.service... May 10 00:50:09.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:09.166704 systemd[1]: Finished systemd-sysctl.service. May 10 00:50:09.175921 kernel: audit: type=1130 audit(1746838209.166:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:09.175960 dracut-cmdline[204]: dracut-dracut-053 May 10 00:50:09.177702 dracut-cmdline[204]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:50:09.239615 kernel: Loading iSCSI transport class v2.0-870. May 10 00:50:09.258619 kernel: iscsi: registered transport (tcp) May 10 00:50:09.283709 kernel: iscsi: registered transport (qla4xxx) May 10 00:50:09.283781 kernel: QLogic iSCSI HBA Driver May 10 00:50:09.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:09.315273 systemd[1]: Finished dracut-cmdline.service. May 10 00:50:09.316995 systemd[1]: Starting dracut-pre-udev.service... May 10 00:50:09.369637 kernel: raid6: avx512x4 gen() 18061 MB/s May 10 00:50:09.387621 kernel: raid6: avx512x4 xor() 8307 MB/s May 10 00:50:09.405620 kernel: raid6: avx512x2 gen() 17920 MB/s May 10 00:50:09.423621 kernel: raid6: avx512x2 xor() 24131 MB/s May 10 00:50:09.441623 kernel: raid6: avx512x1 gen() 17915 MB/s May 10 00:50:09.459620 kernel: raid6: avx512x1 xor() 21888 MB/s May 10 00:50:09.477622 kernel: raid6: avx2x4 gen() 17833 MB/s May 10 00:50:09.495618 kernel: raid6: avx2x4 xor() 7754 MB/s May 10 00:50:09.513623 kernel: raid6: avx2x2 gen() 17811 MB/s May 10 00:50:09.531619 kernel: raid6: avx2x2 xor() 18089 MB/s May 10 00:50:09.549620 kernel: raid6: avx2x1 gen() 13557 MB/s May 10 00:50:09.567617 kernel: raid6: avx2x1 xor() 15728 MB/s May 10 00:50:09.585619 kernel: raid6: sse2x4 gen() 9528 MB/s May 10 00:50:09.603618 kernel: raid6: sse2x4 xor() 6191 MB/s May 10 00:50:09.621615 kernel: raid6: sse2x2 gen() 10582 MB/s May 10 00:50:09.639615 kernel: raid6: sse2x2 xor() 6309 MB/s May 10 00:50:09.657614 kernel: raid6: sse2x1 gen() 9448 MB/s May 10 00:50:09.675925 kernel: raid6: sse2x1 xor() 4877 MB/s May 10 00:50:09.675966 kernel: raid6: using algorithm avx512x4 gen() 18061 MB/s May 10 00:50:09.675986 kernel: raid6: .... xor() 8307 MB/s, rmw enabled May 10 00:50:09.677070 kernel: raid6: using avx512x2 recovery algorithm May 10 00:50:09.691623 kernel: xor: automatically using best checksumming function avx May 10 00:50:09.793618 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 10 00:50:09.802051 systemd[1]: Finished dracut-pre-udev.service. May 10 00:50:09.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:09.801000 audit: BPF prog-id=7 op=LOAD May 10 00:50:09.801000 audit: BPF prog-id=8 op=LOAD May 10 00:50:09.803684 systemd[1]: Starting systemd-udevd.service... May 10 00:50:09.817994 systemd-udevd[384]: Using default interface naming scheme 'v252'. May 10 00:50:09.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:09.823281 systemd[1]: Started systemd-udevd.service. May 10 00:50:09.828180 systemd[1]: Starting dracut-pre-trigger.service... May 10 00:50:09.846197 dracut-pre-trigger[396]: rd.md=0: removing MD RAID activation May 10 00:50:09.877465 systemd[1]: Finished dracut-pre-trigger.service. May 10 00:50:09.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:09.879061 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:50:09.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:09.920865 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:50:09.979611 kernel: cryptd: max_cpu_qlen set to 1000 May 10 00:50:10.009019 kernel: AVX2 version of gcm_enc/dec engaged. May 10 00:50:10.009089 kernel: ena 0000:00:05.0: ENA device version: 0.10 May 10 00:50:10.017732 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 May 10 00:50:10.017876 kernel: AES CTR mode by8 optimization enabled May 10 00:50:10.017889 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. May 10 00:50:10.017990 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80400000, mac addr 06:93:c4:7e:02:29 May 10 00:50:10.018482 (udev-worker)[437]: Network interface NamePolicy= disabled on kernel command line. May 10 00:50:10.042612 kernel: nvme nvme0: pci function 0000:00:04.0 May 10 00:50:10.042850 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 10 00:50:10.054613 kernel: nvme nvme0: 2/0/0 default/read/poll queues May 10 00:50:10.063097 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 10 00:50:10.063174 kernel: GPT:9289727 != 16777215 May 10 00:50:10.063187 kernel: GPT:Alternate GPT header not at the end of the disk. May 10 00:50:10.064532 kernel: GPT:9289727 != 16777215 May 10 00:50:10.065609 kernel: GPT: Use GNU Parted to correct GPT errors. May 10 00:50:10.068108 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 10 00:50:10.129615 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (433) May 10 00:50:10.178489 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:50:10.194202 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 10 00:50:10.208926 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 10 00:50:10.229021 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 10 00:50:10.229904 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 10 00:50:10.233539 systemd[1]: Starting disk-uuid.service... May 10 00:50:10.241006 disk-uuid[592]: Primary Header is updated. May 10 00:50:10.241006 disk-uuid[592]: Secondary Entries is updated. May 10 00:50:10.241006 disk-uuid[592]: Secondary Header is updated. May 10 00:50:10.247607 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 10 00:50:10.253629 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 10 00:50:11.267729 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 10 00:50:11.267785 disk-uuid[593]: The operation has completed successfully. May 10 00:50:11.371581 systemd[1]: disk-uuid.service: Deactivated successfully. May 10 00:50:11.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:11.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:11.371709 systemd[1]: Finished disk-uuid.service. May 10 00:50:11.373213 systemd[1]: Starting verity-setup.service... May 10 00:50:11.401043 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 10 00:50:11.491680 systemd[1]: Found device dev-mapper-usr.device. May 10 00:50:11.494015 systemd[1]: Mounting sysusr-usr.mount... May 10 00:50:11.495616 systemd[1]: Finished verity-setup.service. May 10 00:50:11.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:11.583616 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 00:50:11.584133 systemd[1]: Mounted sysusr-usr.mount. May 10 00:50:11.584960 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 10 00:50:11.585818 systemd[1]: Starting ignition-setup.service... May 10 00:50:11.588730 systemd[1]: Starting parse-ip-for-networkd.service... May 10 00:50:11.609373 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm May 10 00:50:11.609434 kernel: BTRFS info (device nvme0n1p6): using free space tree May 10 00:50:11.609447 kernel: BTRFS info (device nvme0n1p6): has skinny extents May 10 00:50:11.631617 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations May 10 00:50:11.642230 systemd[1]: mnt-oem.mount: Deactivated successfully. May 10 00:50:11.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:11.652205 systemd[1]: Finished ignition-setup.service. May 10 00:50:11.653782 systemd[1]: Starting ignition-fetch-offline.service... May 10 00:50:11.676115 systemd[1]: Finished parse-ip-for-networkd.service. May 10 00:50:11.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:11.676000 audit: BPF prog-id=9 op=LOAD May 10 00:50:11.678749 systemd[1]: Starting systemd-networkd.service... May 10 00:50:11.703333 systemd-networkd[1021]: lo: Link UP May 10 00:50:11.703347 systemd-networkd[1021]: lo: Gained carrier May 10 00:50:11.703988 systemd-networkd[1021]: Enumeration completed May 10 00:50:11.704109 systemd[1]: Started systemd-networkd.service. May 10 00:50:11.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:11.704390 systemd-networkd[1021]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:50:11.707388 systemd-networkd[1021]: eth0: Link UP May 10 00:50:11.707394 systemd-networkd[1021]: eth0: Gained carrier May 10 00:50:11.708583 systemd[1]: Reached target network.target. May 10 00:50:11.712187 systemd[1]: Starting iscsiuio.service... May 10 00:50:11.719871 systemd-networkd[1021]: eth0: DHCPv4 address 172.31.22.34/20, gateway 172.31.16.1 acquired from 172.31.16.1 May 10 00:50:11.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:11.721097 systemd[1]: Started iscsiuio.service. May 10 00:50:11.723509 systemd[1]: Starting iscsid.service... May 10 00:50:11.728621 iscsid[1026]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 10 00:50:11.728621 iscsid[1026]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 10 00:50:11.728621 iscsid[1026]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 10 00:50:11.728621 iscsid[1026]: If using hardware iscsi like qla4xxx this message can be ignored. May 10 00:50:11.728621 iscsid[1026]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 10 00:50:11.728621 iscsid[1026]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 10 00:50:11.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:11.730411 systemd[1]: Started iscsid.service. May 10 00:50:11.732649 systemd[1]: Starting dracut-initqueue.service... May 10 00:50:11.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:11.748920 systemd[1]: Finished dracut-initqueue.service. May 10 00:50:11.750309 systemd[1]: Reached target remote-fs-pre.target. May 10 00:50:11.751718 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:50:11.753146 systemd[1]: Reached target remote-fs.target. May 10 00:50:11.756285 systemd[1]: Starting dracut-pre-mount.service... May 10 00:50:11.767202 systemd[1]: Finished dracut-pre-mount.service. May 10 00:50:11.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:12.114048 ignition[995]: Ignition 2.14.0 May 10 00:50:12.114061 ignition[995]: Stage: fetch-offline May 10 00:50:12.114168 ignition[995]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:50:12.114199 ignition[995]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:50:12.128372 ignition[995]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:50:12.128760 ignition[995]: Ignition finished successfully May 10 00:50:12.130845 systemd[1]: Finished ignition-fetch-offline.service. May 10 00:50:12.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:12.132437 systemd[1]: Starting ignition-fetch.service... May 10 00:50:12.140458 ignition[1045]: Ignition 2.14.0 May 10 00:50:12.140469 ignition[1045]: Stage: fetch May 10 00:50:12.140626 ignition[1045]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:50:12.140648 ignition[1045]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:50:12.146484 ignition[1045]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:50:12.147284 ignition[1045]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:50:12.154103 ignition[1045]: INFO : PUT result: OK May 10 00:50:12.155917 ignition[1045]: DEBUG : parsed url from cmdline: "" May 10 00:50:12.155917 ignition[1045]: INFO : no config URL provided May 10 00:50:12.155917 ignition[1045]: INFO : reading system config file "/usr/lib/ignition/user.ign" May 10 00:50:12.159672 ignition[1045]: INFO : no config at "/usr/lib/ignition/user.ign" May 10 00:50:12.159672 ignition[1045]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:50:12.159672 ignition[1045]: INFO : PUT result: OK May 10 00:50:12.159672 ignition[1045]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 May 10 00:50:12.159672 ignition[1045]: INFO : GET result: OK May 10 00:50:12.159672 ignition[1045]: DEBUG : parsing config with SHA512: 5cb5d5d32f2f35f705871447f63ab45c93f674b598598478a684a65aa1c60d1d317f557a42aabd5467b9e07c40a13b513b3bd98ed6981e42d6a5e2c62f9302a6 May 10 00:50:12.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:12.161332 unknown[1045]: fetched base config from "system" May 10 00:50:12.162198 ignition[1045]: fetch: fetch complete May 10 00:50:12.161344 unknown[1045]: fetched base config from "system" May 10 00:50:12.162205 ignition[1045]: fetch: fetch passed May 10 00:50:12.161353 unknown[1045]: fetched user config from "aws" May 10 00:50:12.162263 ignition[1045]: Ignition finished successfully May 10 00:50:12.164925 systemd[1]: Finished ignition-fetch.service. May 10 00:50:12.166852 systemd[1]: Starting ignition-kargs.service... May 10 00:50:12.179772 ignition[1051]: Ignition 2.14.0 May 10 00:50:12.179782 ignition[1051]: Stage: kargs May 10 00:50:12.179987 ignition[1051]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:50:12.180023 ignition[1051]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:50:12.187893 ignition[1051]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:50:12.189199 ignition[1051]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:50:12.191155 ignition[1051]: INFO : PUT result: OK May 10 00:50:12.193446 ignition[1051]: kargs: kargs passed May 10 00:50:12.193513 ignition[1051]: Ignition finished successfully May 10 00:50:12.194685 systemd[1]: Finished ignition-kargs.service. May 10 00:50:12.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:12.196574 systemd[1]: Starting ignition-disks.service... May 10 00:50:12.205987 ignition[1057]: Ignition 2.14.0 May 10 00:50:12.206000 ignition[1057]: Stage: disks May 10 00:50:12.206204 ignition[1057]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:50:12.206239 ignition[1057]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:50:12.214740 ignition[1057]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:50:12.215620 ignition[1057]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:50:12.216532 ignition[1057]: INFO : PUT result: OK May 10 00:50:12.219827 ignition[1057]: disks: disks passed May 10 00:50:12.219885 ignition[1057]: Ignition finished successfully May 10 00:50:12.220736 systemd[1]: Finished ignition-disks.service. May 10 00:50:12.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:12.221876 systemd[1]: Reached target initrd-root-device.target. May 10 00:50:12.222951 systemd[1]: Reached target local-fs-pre.target. May 10 00:50:12.223956 systemd[1]: Reached target local-fs.target. May 10 00:50:12.225101 systemd[1]: Reached target sysinit.target. May 10 00:50:12.226203 systemd[1]: Reached target basic.target. May 10 00:50:12.228095 systemd[1]: Starting systemd-fsck-root.service... May 10 00:50:12.260765 systemd-fsck[1065]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 10 00:50:12.263680 systemd[1]: Finished systemd-fsck-root.service. May 10 00:50:12.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:12.265148 systemd[1]: Mounting sysroot.mount... May 10 00:50:12.284611 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 00:50:12.285195 systemd[1]: Mounted sysroot.mount. May 10 00:50:12.287216 systemd[1]: Reached target initrd-root-fs.target. May 10 00:50:12.296092 systemd[1]: Mounting sysroot-usr.mount... May 10 00:50:12.298171 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 10 00:50:12.298765 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 10 00:50:12.298794 systemd[1]: Reached target ignition-diskful.target. May 10 00:50:12.300994 systemd[1]: Mounted sysroot-usr.mount. May 10 00:50:12.304454 systemd[1]: Starting initrd-setup-root.service... May 10 00:50:12.317368 initrd-setup-root[1086]: cut: /sysroot/etc/passwd: No such file or directory May 10 00:50:12.343032 initrd-setup-root[1094]: cut: /sysroot/etc/group: No such file or directory May 10 00:50:12.347368 initrd-setup-root[1102]: cut: /sysroot/etc/shadow: No such file or directory May 10 00:50:12.352888 initrd-setup-root[1110]: cut: /sysroot/etc/gshadow: No such file or directory May 10 00:50:12.491758 systemd[1]: Finished initrd-setup-root.service. May 10 00:50:12.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:12.493371 systemd[1]: Starting ignition-mount.service... May 10 00:50:12.494685 systemd[1]: Starting sysroot-boot.service... May 10 00:50:12.501814 bash[1127]: umount: /sysroot/usr/share/oem: not mounted. May 10 00:50:12.510922 ignition[1128]: INFO : Ignition 2.14.0 May 10 00:50:12.510922 ignition[1128]: INFO : Stage: mount May 10 00:50:12.512451 ignition[1128]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:50:12.512451 ignition[1128]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:50:12.517715 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:50:12.523301 ignition[1128]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:50:12.524454 ignition[1128]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:50:12.525707 ignition[1128]: INFO : PUT result: OK May 10 00:50:12.528633 ignition[1128]: INFO : mount: mount passed May 10 00:50:12.529472 ignition[1128]: INFO : Ignition finished successfully May 10 00:50:12.531192 systemd[1]: Finished ignition-mount.service. May 10 00:50:12.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:12.534200 systemd[1]: Finished sysroot-boot.service. May 10 00:50:12.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:12.544626 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1135) May 10 00:50:12.548504 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm May 10 00:50:12.548554 kernel: BTRFS info (device nvme0n1p6): using free space tree May 10 00:50:12.548568 kernel: BTRFS info (device nvme0n1p6): has skinny extents May 10 00:50:12.558615 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations May 10 00:50:12.567937 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:50:12.569485 systemd[1]: Starting ignition-files.service... May 10 00:50:12.584809 ignition[1158]: INFO : Ignition 2.14.0 May 10 00:50:12.584809 ignition[1158]: INFO : Stage: files May 10 00:50:12.586334 ignition[1158]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:50:12.586334 ignition[1158]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:50:12.592765 ignition[1158]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:50:12.593677 ignition[1158]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:50:12.594349 ignition[1158]: INFO : PUT result: OK May 10 00:50:12.597297 ignition[1158]: DEBUG : files: compiled without relabeling support, skipping May 10 00:50:12.603728 ignition[1158]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 10 00:50:12.603728 ignition[1158]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 10 00:50:12.609108 ignition[1158]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 10 00:50:12.610686 ignition[1158]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 10 00:50:12.613316 unknown[1158]: wrote ssh authorized keys file for user: core May 10 00:50:12.614245 ignition[1158]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 10 00:50:12.621045 ignition[1158]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar-cgroupv1" May 10 00:50:12.622551 ignition[1158]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar-cgroupv1" May 10 00:50:12.622551 ignition[1158]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/eks/bootstrap.sh" May 10 00:50:12.622551 ignition[1158]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 10 00:50:12.630526 ignition[1158]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3184751397" May 10 00:50:12.630526 ignition[1158]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3184751397": device or resource busy May 10 00:50:12.633660 ignition[1158]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3184751397", trying btrfs: device or resource busy May 10 00:50:12.633660 ignition[1158]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3184751397" May 10 00:50:12.636788 ignition[1158]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3184751397" May 10 00:50:12.650585 ignition[1158]: INFO : op(3): [started] unmounting "/mnt/oem3184751397" May 10 00:50:12.652324 systemd[1]: mnt-oem3184751397.mount: Deactivated successfully. May 10 00:50:12.654330 ignition[1158]: INFO : op(3): [finished] unmounting "/mnt/oem3184751397" May 10 00:50:12.654330 ignition[1158]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" May 10 00:50:12.654330 ignition[1158]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/install.sh" May 10 00:50:12.654330 ignition[1158]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh" May 10 00:50:12.654330 ignition[1158]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:50:12.654330 ignition[1158]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:50:12.654330 ignition[1158]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:50:12.654330 ignition[1158]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:50:12.654330 ignition[1158]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" May 10 00:50:12.654330 ignition[1158]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 10 00:50:12.692141 ignition[1158]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2576165406" May 10 00:50:12.692141 ignition[1158]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2576165406": device or resource busy May 10 00:50:12.692141 ignition[1158]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2576165406", trying btrfs: device or resource busy May 10 00:50:12.692141 ignition[1158]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2576165406" May 10 00:50:12.692141 ignition[1158]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2576165406" May 10 00:50:12.692141 ignition[1158]: INFO : op(6): [started] unmounting "/mnt/oem2576165406" May 10 00:50:12.692141 ignition[1158]: INFO : op(6): [finished] unmounting "/mnt/oem2576165406" May 10 00:50:12.692141 ignition[1158]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" May 10 00:50:12.692141 ignition[1158]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" May 10 00:50:12.692141 ignition[1158]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 10 00:50:12.692141 ignition[1158]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3469618254" May 10 00:50:12.692141 ignition[1158]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3469618254": device or resource busy May 10 00:50:12.692141 ignition[1158]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3469618254", trying btrfs: device or resource busy May 10 00:50:12.692141 ignition[1158]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3469618254" May 10 00:50:12.692141 ignition[1158]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3469618254" May 10 00:50:12.692141 ignition[1158]: INFO : op(9): [started] unmounting "/mnt/oem3469618254" May 10 00:50:12.692141 ignition[1158]: INFO : op(9): [finished] unmounting "/mnt/oem3469618254" May 10 00:50:12.692141 ignition[1158]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" May 10 00:50:12.692141 ignition[1158]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" May 10 00:50:12.692141 ignition[1158]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 10 00:50:12.736036 ignition[1158]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1378039892" May 10 00:50:12.736036 ignition[1158]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1378039892": device or resource busy May 10 00:50:12.736036 ignition[1158]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1378039892", trying btrfs: device or resource busy May 10 00:50:12.736036 ignition[1158]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1378039892" May 10 00:50:12.736036 ignition[1158]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1378039892" May 10 00:50:12.736036 ignition[1158]: INFO : op(c): [started] unmounting "/mnt/oem1378039892" May 10 00:50:12.736036 ignition[1158]: INFO : op(c): [finished] unmounting "/mnt/oem1378039892" May 10 00:50:12.736036 ignition[1158]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" May 10 00:50:12.736036 ignition[1158]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:50:12.736036 ignition[1158]: INFO : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 May 10 00:50:13.190857 ignition[1158]: INFO : GET result: OK May 10 00:50:13.300707 systemd-networkd[1021]: eth0: Gained IPv6LL May 10 00:50:13.601279 ignition[1158]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:50:13.601279 ignition[1158]: INFO : files: op(c): [started] processing unit "coreos-metadata-sshkeys@.service" May 10 00:50:13.601279 ignition[1158]: INFO : files: op(c): [finished] processing unit "coreos-metadata-sshkeys@.service" May 10 00:50:13.601279 ignition[1158]: INFO : files: op(d): [started] processing unit "amazon-ssm-agent.service" May 10 00:50:13.608314 ignition[1158]: INFO : files: op(d): op(e): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" May 10 00:50:13.608314 ignition[1158]: INFO : files: op(d): op(e): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" May 10 00:50:13.608314 ignition[1158]: INFO : files: op(d): [finished] processing unit "amazon-ssm-agent.service" May 10 00:50:13.608314 ignition[1158]: INFO : files: op(f): [started] processing unit "nvidia.service" May 10 00:50:13.608314 ignition[1158]: INFO : files: op(f): [finished] processing unit "nvidia.service" May 10 00:50:13.608314 ignition[1158]: INFO : files: op(10): [started] processing unit "containerd.service" May 10 00:50:13.608314 ignition[1158]: INFO : files: op(10): op(11): [started] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" May 10 00:50:13.608314 ignition[1158]: INFO : files: op(10): op(11): [finished] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" May 10 00:50:13.608314 ignition[1158]: INFO : files: op(10): [finished] processing unit "containerd.service" May 10 00:50:13.608314 ignition[1158]: INFO : files: op(12): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 00:50:13.608314 ignition[1158]: INFO : files: op(12): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 00:50:13.608314 ignition[1158]: INFO : files: op(13): [started] setting preset to enabled for "amazon-ssm-agent.service" May 10 00:50:13.608314 ignition[1158]: INFO : files: op(13): [finished] setting preset to enabled for "amazon-ssm-agent.service" May 10 00:50:13.608314 ignition[1158]: INFO : files: op(14): [started] setting preset to enabled for "nvidia.service" May 10 00:50:13.608314 ignition[1158]: INFO : files: op(14): [finished] setting preset to enabled for "nvidia.service" May 10 00:50:13.608314 ignition[1158]: INFO : files: createResultFile: createFiles: op(15): [started] writing file "/sysroot/etc/.ignition-result.json" May 10 00:50:13.608314 ignition[1158]: INFO : files: createResultFile: createFiles: op(15): [finished] writing file "/sysroot/etc/.ignition-result.json" May 10 00:50:13.608314 ignition[1158]: INFO : files: files passed May 10 00:50:13.608314 ignition[1158]: INFO : Ignition finished successfully May 10 00:50:13.667657 kernel: kauditd_printk_skb: 26 callbacks suppressed May 10 00:50:13.667682 kernel: audit: type=1130 audit(1746838213.611:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.667702 kernel: audit: type=1130 audit(1746838213.627:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.667714 kernel: audit: type=1131 audit(1746838213.627:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.667725 kernel: audit: type=1130 audit(1746838213.642:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.611370 systemd[1]: Finished ignition-files.service. May 10 00:50:13.618565 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 10 00:50:13.669859 initrd-setup-root-after-ignition[1184]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 10 00:50:13.682350 kernel: audit: type=1130 audit(1746838213.668:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.682378 kernel: audit: type=1131 audit(1746838213.668:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.623285 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 10 00:50:13.624091 systemd[1]: Starting ignition-quench.service... May 10 00:50:13.627745 systemd[1]: ignition-quench.service: Deactivated successfully. May 10 00:50:13.627837 systemd[1]: Finished ignition-quench.service. May 10 00:50:13.642089 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 10 00:50:13.644411 systemd[1]: Reached target ignition-complete.target. May 10 00:50:13.652956 systemd[1]: Starting initrd-parse-etc.service... May 10 00:50:13.668893 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 10 00:50:13.668988 systemd[1]: Finished initrd-parse-etc.service. May 10 00:50:13.670784 systemd[1]: Reached target initrd-fs.target. May 10 00:50:13.683215 systemd[1]: Reached target initrd.target. May 10 00:50:13.685919 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 10 00:50:13.715045 kernel: audit: type=1130 audit(1746838213.704:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.687383 systemd[1]: Starting dracut-pre-pivot.service... May 10 00:50:13.704554 systemd[1]: Finished dracut-pre-pivot.service. May 10 00:50:13.707066 systemd[1]: Starting initrd-cleanup.service... May 10 00:50:13.723283 systemd[1]: Stopped target nss-lookup.target. May 10 00:50:13.724190 systemd[1]: Stopped target remote-cryptsetup.target. May 10 00:50:13.725845 systemd[1]: Stopped target timers.target. May 10 00:50:13.727238 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 10 00:50:13.734013 kernel: audit: type=1131 audit(1746838213.727:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.727451 systemd[1]: Stopped dracut-pre-pivot.service. May 10 00:50:13.728900 systemd[1]: Stopped target initrd.target. May 10 00:50:13.735023 systemd[1]: Stopped target basic.target. May 10 00:50:13.736381 systemd[1]: Stopped target ignition-complete.target. May 10 00:50:13.737822 systemd[1]: Stopped target ignition-diskful.target. May 10 00:50:13.739151 systemd[1]: Stopped target initrd-root-device.target. May 10 00:50:13.740487 systemd[1]: Stopped target remote-fs.target. May 10 00:50:13.741947 systemd[1]: Stopped target remote-fs-pre.target. May 10 00:50:13.743326 systemd[1]: Stopped target sysinit.target. May 10 00:50:13.744726 systemd[1]: Stopped target local-fs.target. May 10 00:50:13.746191 systemd[1]: Stopped target local-fs-pre.target. May 10 00:50:13.747522 systemd[1]: Stopped target swap.target. May 10 00:50:13.755759 kernel: audit: type=1131 audit(1746838213.748:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.748803 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 10 00:50:13.749009 systemd[1]: Stopped dracut-pre-mount.service. May 10 00:50:13.763848 kernel: audit: type=1131 audit(1746838213.756:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.750534 systemd[1]: Stopped target cryptsetup.target. May 10 00:50:13.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.756643 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 10 00:50:13.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.756861 systemd[1]: Stopped dracut-initqueue.service. May 10 00:50:13.758479 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 10 00:50:13.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.776369 iscsid[1026]: iscsid shutting down. May 10 00:50:13.758711 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 10 00:50:13.764946 systemd[1]: ignition-files.service: Deactivated successfully. May 10 00:50:13.765156 systemd[1]: Stopped ignition-files.service. May 10 00:50:13.767924 systemd[1]: Stopping ignition-mount.service... May 10 00:50:13.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.770663 systemd[1]: Stopping iscsid.service... May 10 00:50:13.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.796101 ignition[1197]: INFO : Ignition 2.14.0 May 10 00:50:13.796101 ignition[1197]: INFO : Stage: umount May 10 00:50:13.796101 ignition[1197]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:50:13.796101 ignition[1197]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:50:13.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.772016 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 10 00:50:13.772246 systemd[1]: Stopped kmod-static-nodes.service. May 10 00:50:13.824577 ignition[1197]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:50:13.824577 ignition[1197]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:50:13.824577 ignition[1197]: INFO : PUT result: OK May 10 00:50:13.824577 ignition[1197]: INFO : umount: umount passed May 10 00:50:13.824577 ignition[1197]: INFO : Ignition finished successfully May 10 00:50:13.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.778392 systemd[1]: Stopping sysroot-boot.service... May 10 00:50:13.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.781823 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 10 00:50:13.787193 systemd[1]: Stopped systemd-udev-trigger.service. May 10 00:50:13.791326 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 10 00:50:13.791575 systemd[1]: Stopped dracut-pre-trigger.service. May 10 00:50:13.799557 systemd[1]: iscsid.service: Deactivated successfully. May 10 00:50:13.799703 systemd[1]: Stopped iscsid.service. May 10 00:50:13.804993 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 10 00:50:13.805106 systemd[1]: Finished initrd-cleanup.service. May 10 00:50:13.813400 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 10 00:50:13.820175 systemd[1]: Stopping iscsiuio.service... May 10 00:50:13.821985 systemd[1]: iscsiuio.service: Deactivated successfully. May 10 00:50:13.822094 systemd[1]: Stopped iscsiuio.service. May 10 00:50:13.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.826070 systemd[1]: ignition-mount.service: Deactivated successfully. May 10 00:50:13.826196 systemd[1]: Stopped ignition-mount.service. May 10 00:50:13.827516 systemd[1]: ignition-disks.service: Deactivated successfully. May 10 00:50:13.827582 systemd[1]: Stopped ignition-disks.service. May 10 00:50:13.828903 systemd[1]: ignition-kargs.service: Deactivated successfully. May 10 00:50:13.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.828967 systemd[1]: Stopped ignition-kargs.service. May 10 00:50:13.830899 systemd[1]: ignition-fetch.service: Deactivated successfully. May 10 00:50:13.830945 systemd[1]: Stopped ignition-fetch.service. May 10 00:50:13.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.831583 systemd[1]: Stopped target network.target. May 10 00:50:13.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.832284 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 10 00:50:13.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.832346 systemd[1]: Stopped ignition-fetch-offline.service. May 10 00:50:13.834274 systemd[1]: Stopped target paths.target. May 10 00:50:13.835567 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 10 00:50:13.839655 systemd[1]: Stopped systemd-ask-password-console.path. May 10 00:50:13.840328 systemd[1]: Stopped target slices.target. May 10 00:50:13.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.841719 systemd[1]: Stopped target sockets.target. May 10 00:50:13.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.843041 systemd[1]: iscsid.socket: Deactivated successfully. May 10 00:50:13.877000 audit: BPF prog-id=6 op=UNLOAD May 10 00:50:13.843104 systemd[1]: Closed iscsid.socket. May 10 00:50:13.844399 systemd[1]: iscsiuio.socket: Deactivated successfully. May 10 00:50:13.844449 systemd[1]: Closed iscsiuio.socket. May 10 00:50:13.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.845836 systemd[1]: ignition-setup.service: Deactivated successfully. May 10 00:50:13.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.845909 systemd[1]: Stopped ignition-setup.service. May 10 00:50:13.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.847362 systemd[1]: Stopping systemd-networkd.service... May 10 00:50:13.848795 systemd[1]: Stopping systemd-resolved.service... May 10 00:50:13.850657 systemd-networkd[1021]: eth0: DHCPv6 lease lost May 10 00:50:13.892000 audit: BPF prog-id=9 op=UNLOAD May 10 00:50:13.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.851926 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 00:50:13.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.852055 systemd[1]: Stopped systemd-networkd.service. May 10 00:50:13.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.853862 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 10 00:50:13.853907 systemd[1]: Closed systemd-networkd.socket. May 10 00:50:13.857932 systemd[1]: Stopping network-cleanup.service... May 10 00:50:13.860136 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 10 00:50:13.860219 systemd[1]: Stopped parse-ip-for-networkd.service. May 10 00:50:13.861726 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 10 00:50:13.861790 systemd[1]: Stopped systemd-sysctl.service. May 10 00:50:13.863246 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 10 00:50:13.863305 systemd[1]: Stopped systemd-modules-load.service. May 10 00:50:13.868400 systemd[1]: Stopping systemd-udevd.service... May 10 00:50:13.873083 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 10 00:50:13.874068 systemd[1]: systemd-resolved.service: Deactivated successfully. May 10 00:50:13.874195 systemd[1]: Stopped systemd-resolved.service. May 10 00:50:13.876158 systemd[1]: systemd-udevd.service: Deactivated successfully. May 10 00:50:13.876321 systemd[1]: Stopped systemd-udevd.service. May 10 00:50:13.878849 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 10 00:50:13.878911 systemd[1]: Closed systemd-udevd-control.socket. May 10 00:50:13.882135 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 10 00:50:13.882220 systemd[1]: Closed systemd-udevd-kernel.socket. May 10 00:50:13.884075 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 10 00:50:13.884141 systemd[1]: Stopped dracut-pre-udev.service. May 10 00:50:13.886004 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 10 00:50:13.886063 systemd[1]: Stopped dracut-cmdline.service. May 10 00:50:13.887310 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 10 00:50:13.887366 systemd[1]: Stopped dracut-cmdline-ask.service. May 10 00:50:13.889796 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 10 00:50:13.890833 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 10 00:50:13.890901 systemd[1]: Stopped systemd-vconsole-setup.service. May 10 00:50:13.895839 systemd[1]: network-cleanup.service: Deactivated successfully. May 10 00:50:13.896651 systemd[1]: Stopped network-cleanup.service. May 10 00:50:13.900045 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 10 00:50:13.900160 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 10 00:50:13.931518 systemd[1]: sysroot-boot.service: Deactivated successfully. May 10 00:50:13.931679 systemd[1]: Stopped sysroot-boot.service. May 10 00:50:13.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.933106 systemd[1]: Reached target initrd-switch-root.target. May 10 00:50:13.934372 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 10 00:50:13.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:13.934449 systemd[1]: Stopped initrd-setup-root.service. May 10 00:50:13.936761 systemd[1]: Starting initrd-switch-root.service... May 10 00:50:13.960333 systemd[1]: Switching root. May 10 00:50:13.961000 audit: BPF prog-id=5 op=UNLOAD May 10 00:50:13.961000 audit: BPF prog-id=4 op=UNLOAD May 10 00:50:13.961000 audit: BPF prog-id=3 op=UNLOAD May 10 00:50:13.963000 audit: BPF prog-id=8 op=UNLOAD May 10 00:50:13.963000 audit: BPF prog-id=7 op=UNLOAD May 10 00:50:13.983795 systemd-journald[185]: Journal stopped May 10 00:50:18.610767 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). May 10 00:50:18.610820 kernel: SELinux: Class mctp_socket not defined in policy. May 10 00:50:18.610836 kernel: SELinux: Class anon_inode not defined in policy. May 10 00:50:18.610852 kernel: SELinux: the above unknown classes and permissions will be allowed May 10 00:50:18.610866 kernel: SELinux: policy capability network_peer_controls=1 May 10 00:50:18.610880 kernel: SELinux: policy capability open_perms=1 May 10 00:50:18.610891 kernel: SELinux: policy capability extended_socket_class=1 May 10 00:50:18.610902 kernel: SELinux: policy capability always_check_network=0 May 10 00:50:18.610918 kernel: SELinux: policy capability cgroup_seclabel=1 May 10 00:50:18.610929 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 10 00:50:18.610940 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 10 00:50:18.610951 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 10 00:50:18.610963 systemd[1]: Successfully loaded SELinux policy in 101.903ms. May 10 00:50:18.610982 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.578ms. May 10 00:50:18.610995 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:50:18.611010 systemd[1]: Detected virtualization amazon. May 10 00:50:18.611022 systemd[1]: Detected architecture x86-64. May 10 00:50:18.611036 systemd[1]: Detected first boot. May 10 00:50:18.611048 systemd[1]: Initializing machine ID from VM UUID. May 10 00:50:18.611059 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 10 00:50:18.611072 systemd[1]: Populated /etc with preset unit settings. May 10 00:50:18.611085 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:50:18.611097 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:50:18.611110 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:50:18.611129 systemd[1]: Queued start job for default target multi-user.target. May 10 00:50:18.611141 systemd[1]: Unnecessary job was removed for dev-nvme0n1p6.device. May 10 00:50:18.611152 systemd[1]: Created slice system-addon\x2dconfig.slice. May 10 00:50:18.611164 systemd[1]: Created slice system-addon\x2drun.slice. May 10 00:50:18.611177 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 10 00:50:18.611190 systemd[1]: Created slice system-getty.slice. May 10 00:50:18.611202 systemd[1]: Created slice system-modprobe.slice. May 10 00:50:18.611217 systemd[1]: Created slice system-serial\x2dgetty.slice. May 10 00:50:18.615643 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 10 00:50:18.615670 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 10 00:50:18.615682 systemd[1]: Created slice user.slice. May 10 00:50:18.615695 systemd[1]: Started systemd-ask-password-console.path. May 10 00:50:18.615707 systemd[1]: Started systemd-ask-password-wall.path. May 10 00:50:18.615719 systemd[1]: Set up automount boot.automount. May 10 00:50:18.615731 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 10 00:50:18.615743 systemd[1]: Reached target integritysetup.target. May 10 00:50:18.615755 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:50:18.615772 systemd[1]: Reached target remote-fs.target. May 10 00:50:18.615784 systemd[1]: Reached target slices.target. May 10 00:50:18.615796 systemd[1]: Reached target swap.target. May 10 00:50:18.615808 systemd[1]: Reached target torcx.target. May 10 00:50:18.615820 systemd[1]: Reached target veritysetup.target. May 10 00:50:18.615832 systemd[1]: Listening on systemd-coredump.socket. May 10 00:50:18.615843 systemd[1]: Listening on systemd-initctl.socket. May 10 00:50:18.615855 systemd[1]: Listening on systemd-journald-audit.socket. May 10 00:50:18.615867 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 00:50:18.615882 systemd[1]: Listening on systemd-journald.socket. May 10 00:50:18.615894 systemd[1]: Listening on systemd-networkd.socket. May 10 00:50:18.615906 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:50:18.615918 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:50:18.615930 systemd[1]: Listening on systemd-userdbd.socket. May 10 00:50:18.615942 systemd[1]: Mounting dev-hugepages.mount... May 10 00:50:18.615954 systemd[1]: Mounting dev-mqueue.mount... May 10 00:50:18.615967 systemd[1]: Mounting media.mount... May 10 00:50:18.615979 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:50:18.615993 systemd[1]: Mounting sys-kernel-debug.mount... May 10 00:50:18.616005 systemd[1]: Mounting sys-kernel-tracing.mount... May 10 00:50:18.616017 systemd[1]: Mounting tmp.mount... May 10 00:50:18.616029 systemd[1]: Starting flatcar-tmpfiles.service... May 10 00:50:18.616041 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:50:18.616053 systemd[1]: Starting kmod-static-nodes.service... May 10 00:50:18.616065 systemd[1]: Starting modprobe@configfs.service... May 10 00:50:18.616076 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:50:18.616088 systemd[1]: Starting modprobe@drm.service... May 10 00:50:18.616103 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:50:18.616122 systemd[1]: Starting modprobe@fuse.service... May 10 00:50:18.616137 systemd[1]: Starting modprobe@loop.service... May 10 00:50:18.616150 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 00:50:18.616162 systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling. May 10 00:50:18.616176 systemd[1]: (This warning is only shown for the first unit using IP firewalling.) May 10 00:50:18.616188 systemd[1]: Starting systemd-journald.service... May 10 00:50:18.616200 kernel: loop: module loaded May 10 00:50:18.616214 systemd[1]: Starting systemd-modules-load.service... May 10 00:50:18.616225 systemd[1]: Starting systemd-network-generator.service... May 10 00:50:18.616238 systemd[1]: Starting systemd-remount-fs.service... May 10 00:50:18.616250 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:50:18.616262 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:50:18.616274 systemd[1]: Mounted dev-hugepages.mount. May 10 00:50:18.616288 systemd[1]: Mounted dev-mqueue.mount. May 10 00:50:18.616300 systemd[1]: Mounted media.mount. May 10 00:50:18.616311 systemd[1]: Mounted sys-kernel-debug.mount. May 10 00:50:18.616323 systemd[1]: Mounted sys-kernel-tracing.mount. May 10 00:50:18.616336 systemd[1]: Mounted tmp.mount. May 10 00:50:18.616348 systemd[1]: Finished kmod-static-nodes.service. May 10 00:50:18.616360 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 10 00:50:18.616372 systemd[1]: Finished modprobe@configfs.service. May 10 00:50:18.616384 kernel: kauditd_printk_skb: 54 callbacks suppressed May 10 00:50:18.616400 kernel: audit: type=1130 audit(1746838218.614:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.616417 systemd-journald[1349]: Journal started May 10 00:50:18.616474 systemd-journald[1349]: Runtime Journal (/run/log/journal/ec2c5b6176c5f5abb19064b8ddce942b) is 4.8M, max 38.3M, 33.5M free. May 10 00:50:18.459000 audit[1]: AVC avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:50:18.459000 audit[1]: EVENT_LISTENER pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 May 10 00:50:18.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.607000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 10 00:50:18.607000 audit[1349]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7fffab1304e0 a2=4000 a3=7fffab13057c items=0 ppid=1 pid=1349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:18.607000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 10 00:50:18.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.625016 systemd[1]: Started systemd-journald.service. May 10 00:50:18.625071 kernel: audit: type=1131 audit(1746838218.621:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.634461 kernel: fuse: init (API version 7.34) May 10 00:50:18.634524 kernel: audit: type=1130 audit(1746838218.630:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.638016 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:50:18.653570 kernel: audit: type=1130 audit(1746838218.641:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.653784 kernel: audit: type=1131 audit(1746838218.641:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.641980 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:50:18.643024 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:50:18.653581 systemd[1]: Finished modprobe@drm.service. May 10 00:50:18.654685 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:50:18.654843 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:50:18.655807 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 10 00:50:18.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.656688 systemd[1]: Finished modprobe@fuse.service. May 10 00:50:18.657736 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:50:18.657878 systemd[1]: Finished modprobe@loop.service. May 10 00:50:18.667265 kernel: audit: type=1130 audit(1746838218.652:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.667323 kernel: audit: type=1131 audit(1746838218.652:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.663909 systemd[1]: Finished systemd-modules-load.service. May 10 00:50:18.664942 systemd[1]: Finished systemd-network-generator.service. May 10 00:50:18.666067 systemd[1]: Finished systemd-remount-fs.service. May 10 00:50:18.667248 systemd[1]: Reached target network-pre.target. May 10 00:50:18.674282 kernel: audit: type=1130 audit(1746838218.653:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.673948 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 10 00:50:18.680430 systemd[1]: Mounting sys-kernel-config.mount... May 10 00:50:18.681273 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 00:50:18.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.686057 systemd[1]: Starting systemd-hwdb-update.service... May 10 00:50:18.692618 kernel: audit: type=1131 audit(1746838218.653:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.692146 systemd[1]: Starting systemd-journal-flush.service... May 10 00:50:18.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.694476 kernel: audit: type=1130 audit(1746838218.655:101): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.701026 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:50:18.702527 systemd[1]: Starting systemd-random-seed.service... May 10 00:50:18.705317 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:50:18.706429 systemd[1]: Starting systemd-sysctl.service... May 10 00:50:18.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.718388 systemd-journald[1349]: Time spent on flushing to /var/log/journal/ec2c5b6176c5f5abb19064b8ddce942b is 34.510ms for 1136 entries. May 10 00:50:18.718388 systemd-journald[1349]: System Journal (/var/log/journal/ec2c5b6176c5f5abb19064b8ddce942b) is 8.0M, max 195.6M, 187.6M free. May 10 00:50:18.767185 systemd-journald[1349]: Received client request to flush runtime journal. May 10 00:50:18.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.713824 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:50:18.714718 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 10 00:50:18.768175 udevadm[1390]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 10 00:50:18.715467 systemd[1]: Mounted sys-kernel-config.mount. May 10 00:50:18.717369 systemd[1]: Starting systemd-udev-settle.service... May 10 00:50:18.726206 systemd[1]: Finished systemd-random-seed.service. May 10 00:50:18.727204 systemd[1]: Reached target first-boot-complete.target. May 10 00:50:18.733609 systemd[1]: Finished flatcar-tmpfiles.service. May 10 00:50:18.735510 systemd[1]: Starting systemd-sysusers.service... May 10 00:50:18.762360 systemd[1]: Finished systemd-sysctl.service. May 10 00:50:18.768081 systemd[1]: Finished systemd-journal-flush.service. May 10 00:50:18.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.783395 systemd[1]: Finished systemd-sysusers.service. May 10 00:50:18.785292 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:50:18.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:18.836771 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:50:19.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:19.277710 systemd[1]: Finished systemd-hwdb-update.service. May 10 00:50:19.279544 systemd[1]: Starting systemd-udevd.service... May 10 00:50:19.299444 systemd-udevd[1404]: Using default interface naming scheme 'v252'. May 10 00:50:19.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:19.343821 systemd[1]: Started systemd-udevd.service. May 10 00:50:19.346154 systemd[1]: Starting systemd-networkd.service... May 10 00:50:19.374463 systemd[1]: Starting systemd-userdbd.service... May 10 00:50:19.376300 systemd[1]: Found device dev-ttyS0.device. May 10 00:50:19.389933 (udev-worker)[1410]: Network interface NamePolicy= disabled on kernel command line. May 10 00:50:19.415618 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 10 00:50:19.427228 systemd[1]: Started systemd-userdbd.service. May 10 00:50:19.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:19.450597 kernel: ACPI: button: Power Button [PWRF] May 10 00:50:19.450672 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 May 10 00:50:19.465720 kernel: ACPI: button: Sleep Button [SLPF] May 10 00:50:19.456000 audit[1411]: AVC avc: denied { confidentiality } for pid=1411 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:50:19.456000 audit[1411]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55fb3c08cda0 a1=338ac a2=7fafff407bc5 a3=5 items=110 ppid=1404 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:19.456000 audit: CWD cwd="/" May 10 00:50:19.456000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=1 name=(null) inode=14787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=2 name=(null) inode=14787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=3 name=(null) inode=14788 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=4 name=(null) inode=14787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=5 name=(null) inode=14789 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=6 name=(null) inode=14787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=7 name=(null) inode=14790 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=8 name=(null) inode=14790 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=9 name=(null) inode=14791 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=10 name=(null) inode=14790 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=11 name=(null) inode=14792 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=12 name=(null) inode=14790 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=13 name=(null) inode=14793 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=14 name=(null) inode=14790 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=15 name=(null) inode=14794 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=16 name=(null) inode=14790 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=17 name=(null) inode=14795 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=18 name=(null) inode=14787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=19 name=(null) inode=14796 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=20 name=(null) inode=14796 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=21 name=(null) inode=14797 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=22 name=(null) inode=14796 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=23 name=(null) inode=14798 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=24 name=(null) inode=14796 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=25 name=(null) inode=14799 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=26 name=(null) inode=14796 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=27 name=(null) inode=14800 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=28 name=(null) inode=14796 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=29 name=(null) inode=14801 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=30 name=(null) inode=14787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=31 name=(null) inode=14802 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=32 name=(null) inode=14802 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=33 name=(null) inode=14803 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=34 name=(null) inode=14802 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=35 name=(null) inode=14804 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=36 name=(null) inode=14802 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=37 name=(null) inode=14805 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=38 name=(null) inode=14802 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=39 name=(null) inode=14806 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=40 name=(null) inode=14802 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=41 name=(null) inode=14807 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=42 name=(null) inode=14787 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=43 name=(null) inode=14808 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=44 name=(null) inode=14808 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=45 name=(null) inode=14809 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=46 name=(null) inode=14808 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=47 name=(null) inode=14810 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=48 name=(null) inode=14808 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=49 name=(null) inode=14811 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=50 name=(null) inode=14808 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=51 name=(null) inode=14812 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=52 name=(null) inode=14808 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=53 name=(null) inode=14813 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=55 name=(null) inode=14814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=56 name=(null) inode=14814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=57 name=(null) inode=14815 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=58 name=(null) inode=14814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=59 name=(null) inode=14816 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=60 name=(null) inode=14814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=61 name=(null) inode=14817 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=62 name=(null) inode=14817 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=63 name=(null) inode=14818 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=64 name=(null) inode=14817 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=65 name=(null) inode=14819 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=66 name=(null) inode=14817 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=67 name=(null) inode=14820 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=68 name=(null) inode=14817 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=69 name=(null) inode=14821 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=70 name=(null) inode=14817 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=71 name=(null) inode=14822 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=72 name=(null) inode=14814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=73 name=(null) inode=14823 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=74 name=(null) inode=14823 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=75 name=(null) inode=14824 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=76 name=(null) inode=14823 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=77 name=(null) inode=14825 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=78 name=(null) inode=14823 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=79 name=(null) inode=14826 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=80 name=(null) inode=14823 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=81 name=(null) inode=14827 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=82 name=(null) inode=14823 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=83 name=(null) inode=14828 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=84 name=(null) inode=14814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=85 name=(null) inode=14829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=86 name=(null) inode=14829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=87 name=(null) inode=14830 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=88 name=(null) inode=14829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=89 name=(null) inode=14831 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=90 name=(null) inode=14829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=91 name=(null) inode=14832 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=92 name=(null) inode=14829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=93 name=(null) inode=14833 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=94 name=(null) inode=14829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=95 name=(null) inode=14834 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=96 name=(null) inode=14814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=97 name=(null) inode=14835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=98 name=(null) inode=14835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=99 name=(null) inode=14836 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=100 name=(null) inode=14835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=101 name=(null) inode=14837 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=102 name=(null) inode=14835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=103 name=(null) inode=14838 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=104 name=(null) inode=14835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=105 name=(null) inode=14839 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=106 name=(null) inode=14835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=107 name=(null) inode=14840 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PATH item=109 name=(null) inode=14843 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:19.456000 audit: PROCTITLE proctitle="(udev-worker)" May 10 00:50:19.490608 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr May 10 00:50:19.515778 systemd-networkd[1413]: lo: Link UP May 10 00:50:19.515788 systemd-networkd[1413]: lo: Gained carrier May 10 00:50:19.516201 systemd-networkd[1413]: Enumeration completed May 10 00:50:19.516321 systemd[1]: Started systemd-networkd.service. May 10 00:50:19.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:19.518166 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 00:50:19.519142 systemd-networkd[1413]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:50:19.524017 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:50:19.523736 systemd-networkd[1413]: eth0: Link UP May 10 00:50:19.523850 systemd-networkd[1413]: eth0: Gained carrier May 10 00:50:19.527644 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 May 10 00:50:19.532644 kernel: mousedev: PS/2 mouse device common for all mice May 10 00:50:19.532758 systemd-networkd[1413]: eth0: DHCPv4 address 172.31.22.34/20, gateway 172.31.16.1 acquired from 172.31.16.1 May 10 00:50:19.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:19.630145 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:50:19.631137 systemd[1]: Finished systemd-udev-settle.service. May 10 00:50:19.633186 systemd[1]: Starting lvm2-activation-early.service... May 10 00:50:19.676850 lvm[1519]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:50:19.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:19.704897 systemd[1]: Finished lvm2-activation-early.service. May 10 00:50:19.705741 systemd[1]: Reached target cryptsetup.target. May 10 00:50:19.707480 systemd[1]: Starting lvm2-activation.service... May 10 00:50:19.712958 lvm[1521]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:50:19.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:19.732951 systemd[1]: Finished lvm2-activation.service. May 10 00:50:19.733799 systemd[1]: Reached target local-fs-pre.target. May 10 00:50:19.734380 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 10 00:50:19.734402 systemd[1]: Reached target local-fs.target. May 10 00:50:19.734946 systemd[1]: Reached target machines.target. May 10 00:50:19.736776 systemd[1]: Starting ldconfig.service... May 10 00:50:19.738468 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:50:19.738556 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:50:19.739850 systemd[1]: Starting systemd-boot-update.service... May 10 00:50:19.741703 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 10 00:50:19.743573 systemd[1]: Starting systemd-machine-id-commit.service... May 10 00:50:19.745578 systemd[1]: Starting systemd-sysext.service... May 10 00:50:19.750950 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1524 (bootctl) May 10 00:50:19.752437 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 10 00:50:19.764424 systemd[1]: Unmounting usr-share-oem.mount... May 10 00:50:19.770739 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 10 00:50:19.770984 systemd[1]: Unmounted usr-share-oem.mount. May 10 00:50:19.787284 kernel: loop0: detected capacity change from 0 to 210664 May 10 00:50:19.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:19.786130 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 10 00:50:19.900403 systemd-fsck[1537]: fsck.fat 4.2 (2021-01-31) May 10 00:50:19.900403 systemd-fsck[1537]: /dev/nvme0n1p1: 790 files, 120688/258078 clusters May 10 00:50:19.900910 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 10 00:50:19.903444 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 10 00:50:19.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:19.905540 systemd[1]: Mounting boot.mount... May 10 00:50:19.912636 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 10 00:50:19.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:19.914394 systemd[1]: Finished systemd-machine-id-commit.service. May 10 00:50:19.924618 kernel: loop1: detected capacity change from 0 to 210664 May 10 00:50:19.929482 systemd[1]: Mounted boot.mount. May 10 00:50:19.955640 (sd-sysext)[1545]: Using extensions 'kubernetes'. May 10 00:50:19.956456 (sd-sysext)[1545]: Merged extensions into '/usr'. May 10 00:50:19.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:19.961844 systemd[1]: Finished systemd-boot-update.service. May 10 00:50:19.976775 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:50:19.978455 systemd[1]: Mounting usr-share-oem.mount... May 10 00:50:19.979423 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:50:19.980677 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:50:19.982483 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:50:19.984233 systemd[1]: Starting modprobe@loop.service... May 10 00:50:19.984967 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:50:19.985384 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:50:19.987334 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:50:19.990911 systemd[1]: Mounted usr-share-oem.mount. May 10 00:50:19.992470 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:50:19.994705 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:50:19.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:19.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:19.996029 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:50:19.996175 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:50:19.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:19.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:19.999244 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:50:19.999514 systemd[1]: Finished modprobe@loop.service. May 10 00:50:19.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:19.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.000701 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:50:20.001722 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:50:20.002034 systemd[1]: Finished systemd-sysext.service. May 10 00:50:20.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.004786 systemd[1]: Starting ensure-sysext.service... May 10 00:50:20.006536 systemd[1]: Starting systemd-tmpfiles-setup.service... May 10 00:50:20.014824 systemd[1]: Reloading. May 10 00:50:20.019357 systemd-tmpfiles[1572]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 10 00:50:20.023329 systemd-tmpfiles[1572]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 10 00:50:20.026855 systemd-tmpfiles[1572]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 10 00:50:20.077808 /usr/lib/systemd/system-generators/torcx-generator[1591]: time="2025-05-10T00:50:20Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:50:20.077836 /usr/lib/systemd/system-generators/torcx-generator[1591]: time="2025-05-10T00:50:20Z" level=info msg="torcx already run" May 10 00:50:20.202217 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:50:20.202382 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:50:20.224058 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:50:20.293865 systemd[1]: Finished systemd-tmpfiles-setup.service. May 10 00:50:20.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.297743 systemd[1]: Starting audit-rules.service... May 10 00:50:20.299436 systemd[1]: Starting clean-ca-certificates.service... May 10 00:50:20.301369 systemd[1]: Starting systemd-journal-catalog-update.service... May 10 00:50:20.303570 systemd[1]: Starting systemd-resolved.service... May 10 00:50:20.312296 systemd[1]: Starting systemd-timesyncd.service... May 10 00:50:20.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.315116 systemd[1]: Starting systemd-update-utmp.service... May 10 00:50:20.316240 systemd[1]: Finished clean-ca-certificates.service. May 10 00:50:20.324250 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:50:20.329559 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:50:20.330889 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:50:20.331000 audit[1662]: SYSTEM_BOOT pid=1662 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 10 00:50:20.333909 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:50:20.336253 systemd[1]: Starting modprobe@loop.service... May 10 00:50:20.337627 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:50:20.337768 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:50:20.337890 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:50:20.338658 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:50:20.338825 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:50:20.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.347253 systemd[1]: Finished systemd-update-utmp.service. May 10 00:50:20.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.348142 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:50:20.348293 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:50:20.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.349139 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:50:20.349299 systemd[1]: Finished modprobe@loop.service. May 10 00:50:20.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.352897 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:50:20.357388 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:50:20.361834 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:50:20.361985 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:50:20.362088 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:50:20.362171 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:50:20.362985 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:50:20.363951 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:50:20.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.366534 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:50:20.370099 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:50:20.372234 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:50:20.375093 systemd[1]: Starting modprobe@drm.service... May 10 00:50:20.378841 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:50:20.380508 systemd[1]: Starting modprobe@loop.service... May 10 00:50:20.381042 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:50:20.381182 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:50:20.381347 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:50:20.382252 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:50:20.382416 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:50:20.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.385996 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:50:20.386149 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:50:20.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.386955 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:50:20.389203 systemd[1]: Finished ensure-sysext.service. May 10 00:50:20.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.395028 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:50:20.395201 systemd[1]: Finished modprobe@drm.service. May 10 00:50:20.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.397876 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:50:20.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.398051 systemd[1]: Finished modprobe@loop.service. May 10 00:50:20.398519 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:50:20.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.440196 systemd[1]: Finished systemd-journal-catalog-update.service. May 10 00:50:20.463505 systemd[1]: Started systemd-timesyncd.service. May 10 00:50:20.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:20.464842 systemd[1]: Reached target time-set.target. May 10 00:50:20.471000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 10 00:50:20.471000 audit[1699]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc89cf5e80 a2=420 a3=0 items=0 ppid=1655 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:20.471000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 10 00:50:20.472925 augenrules[1699]: No rules May 10 00:50:20.473781 systemd[1]: Finished audit-rules.service. May 10 00:50:21.813521 systemd-timesyncd[1660]: Contacted time server 198.137.202.56:123 (0.flatcar.pool.ntp.org). May 10 00:50:21.814005 systemd-timesyncd[1660]: Initial clock synchronization to Sat 2025-05-10 00:50:21.813327 UTC. May 10 00:50:21.816035 systemd-resolved[1658]: Positive Trust Anchors: May 10 00:50:21.816048 systemd-resolved[1658]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:50:21.816080 systemd-resolved[1658]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:50:21.847580 systemd-resolved[1658]: Defaulting to hostname 'linux'. May 10 00:50:21.849728 systemd[1]: Started systemd-resolved.service. May 10 00:50:21.850348 systemd[1]: Reached target network.target. May 10 00:50:21.850750 systemd[1]: Reached target nss-lookup.target. May 10 00:50:21.907622 ldconfig[1523]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 10 00:50:21.917892 systemd[1]: Finished ldconfig.service. May 10 00:50:21.919735 systemd[1]: Starting systemd-update-done.service... May 10 00:50:21.927981 systemd[1]: Finished systemd-update-done.service. May 10 00:50:21.928534 systemd[1]: Reached target sysinit.target. May 10 00:50:21.929008 systemd[1]: Started motdgen.path. May 10 00:50:21.929376 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 10 00:50:21.929893 systemd[1]: Started logrotate.timer. May 10 00:50:21.930318 systemd[1]: Started mdadm.timer. May 10 00:50:21.930656 systemd[1]: Started systemd-tmpfiles-clean.timer. May 10 00:50:21.931007 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 00:50:21.931030 systemd[1]: Reached target paths.target. May 10 00:50:21.931363 systemd[1]: Reached target timers.target. May 10 00:50:21.931996 systemd[1]: Listening on dbus.socket. May 10 00:50:21.933457 systemd[1]: Starting docker.socket... May 10 00:50:21.936018 systemd[1]: Listening on sshd.socket. May 10 00:50:21.936546 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:50:21.937044 systemd[1]: Listening on docker.socket. May 10 00:50:21.937422 systemd[1]: Reached target sockets.target. May 10 00:50:21.937753 systemd[1]: Reached target basic.target. May 10 00:50:21.938262 systemd[1]: System is tainted: cgroupsv1 May 10 00:50:21.938299 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:50:21.938321 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:50:21.939444 systemd[1]: Starting containerd.service... May 10 00:50:21.940893 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 10 00:50:21.942492 systemd[1]: Starting dbus.service... May 10 00:50:21.944509 systemd[1]: Starting enable-oem-cloudinit.service... May 10 00:50:21.948198 systemd[1]: Starting extend-filesystems.service... May 10 00:50:21.948735 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 10 00:50:21.950951 systemd[1]: Starting motdgen.service... May 10 00:50:21.952782 systemd[1]: Starting ssh-key-proc-cmdline.service... May 10 00:50:21.954536 systemd[1]: Starting sshd-keygen.service... May 10 00:50:21.957239 systemd[1]: Starting systemd-logind.service... May 10 00:50:21.957881 jq[1716]: false May 10 00:50:21.958740 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:50:21.958815 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 10 00:50:21.962169 systemd[1]: Starting update-engine.service... May 10 00:50:21.966141 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 10 00:50:21.968996 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 10 00:50:21.971279 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 10 00:50:21.971646 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 10 00:50:21.971913 systemd[1]: Finished ssh-key-proc-cmdline.service. May 10 00:50:21.984868 jq[1726]: true May 10 00:50:21.999708 jq[1735]: true May 10 00:50:22.028429 systemd[1]: motdgen.service: Deactivated successfully. May 10 00:50:22.028679 systemd[1]: Finished motdgen.service. May 10 00:50:22.053695 dbus-daemon[1715]: [system] SELinux support is enabled May 10 00:50:22.054434 systemd[1]: Started dbus.service. May 10 00:50:22.059401 env[1732]: time="2025-05-10T00:50:22.058285850Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 10 00:50:22.056932 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 10 00:50:22.056956 systemd[1]: Reached target system-config.target. May 10 00:50:22.057408 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 10 00:50:22.057421 systemd[1]: Reached target user-config.target. May 10 00:50:22.063164 dbus-daemon[1715]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1413 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") May 10 00:50:22.066319 dbus-daemon[1715]: [system] Successfully activated service 'org.freedesktop.systemd1' May 10 00:50:22.070114 systemd[1]: Starting systemd-hostnamed.service... May 10 00:50:22.089579 extend-filesystems[1717]: Found loop1 May 10 00:50:22.090310 extend-filesystems[1717]: Found nvme0n1 May 10 00:50:22.090310 extend-filesystems[1717]: Found nvme0n1p1 May 10 00:50:22.090310 extend-filesystems[1717]: Found nvme0n1p2 May 10 00:50:22.090310 extend-filesystems[1717]: Found nvme0n1p3 May 10 00:50:22.090310 extend-filesystems[1717]: Found usr May 10 00:50:22.090310 extend-filesystems[1717]: Found nvme0n1p4 May 10 00:50:22.090310 extend-filesystems[1717]: Found nvme0n1p6 May 10 00:50:22.090310 extend-filesystems[1717]: Found nvme0n1p7 May 10 00:50:22.090310 extend-filesystems[1717]: Found nvme0n1p9 May 10 00:50:22.090310 extend-filesystems[1717]: Checking size of /dev/nvme0n1p9 May 10 00:50:22.094422 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:50:22.094449 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:50:22.110795 extend-filesystems[1717]: Resized partition /dev/nvme0n1p9 May 10 00:50:22.119371 extend-filesystems[1775]: resize2fs 1.46.5 (30-Dec-2021) May 10 00:50:22.127456 update_engine[1724]: I0510 00:50:22.125368 1724 main.cc:92] Flatcar Update Engine starting May 10 00:50:22.127896 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks May 10 00:50:22.128743 env[1732]: time="2025-05-10T00:50:22.128700505Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 10 00:50:22.128864 env[1732]: time="2025-05-10T00:50:22.128838738Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 10 00:50:22.133060 systemd[1]: Started update-engine.service. May 10 00:50:22.136007 env[1732]: time="2025-05-10T00:50:22.135535015Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 10 00:50:22.136007 env[1732]: time="2025-05-10T00:50:22.135576692Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 10 00:50:22.135117 systemd[1]: Started locksmithd.service. May 10 00:50:22.137076 update_engine[1724]: I0510 00:50:22.136198 1724 update_check_scheduler.cc:74] Next update check in 2m58s May 10 00:50:22.137292 env[1732]: time="2025-05-10T00:50:22.137263215Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:50:22.137331 env[1732]: time="2025-05-10T00:50:22.137286982Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 10 00:50:22.137331 env[1732]: time="2025-05-10T00:50:22.137313076Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 10 00:50:22.137331 env[1732]: time="2025-05-10T00:50:22.137324696Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 10 00:50:22.137512 env[1732]: time="2025-05-10T00:50:22.137496167Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 10 00:50:22.206567 systemd-logind[1721]: Watching system buttons on /dev/input/event1 (Power Button) May 10 00:50:22.206589 systemd-logind[1721]: Watching system buttons on /dev/input/event2 (Sleep Button) May 10 00:50:22.209353 env[1732]: time="2025-05-10T00:50:22.209253632Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 10 00:50:22.206609 systemd-logind[1721]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 10 00:50:22.206819 systemd-logind[1721]: New seat seat0. May 10 00:50:22.208388 systemd[1]: Started systemd-logind.service. May 10 00:50:22.209759 env[1732]: time="2025-05-10T00:50:22.209592580Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:50:22.209759 env[1732]: time="2025-05-10T00:50:22.209613336Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 10 00:50:22.209759 env[1732]: time="2025-05-10T00:50:22.209678920Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 10 00:50:22.209759 env[1732]: time="2025-05-10T00:50:22.209691473Z" level=info msg="metadata content store policy set" policy=shared May 10 00:50:22.210195 bash[1770]: Updated "/home/core/.ssh/authorized_keys" May 10 00:50:22.211127 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 10 00:50:22.217868 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 May 10 00:50:22.240419 extend-filesystems[1775]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required May 10 00:50:22.240419 extend-filesystems[1775]: old_desc_blocks = 1, new_desc_blocks = 1 May 10 00:50:22.240419 extend-filesystems[1775]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. May 10 00:50:22.242901 extend-filesystems[1717]: Resized filesystem in /dev/nvme0n1p9 May 10 00:50:22.241013 systemd[1]: extend-filesystems.service: Deactivated successfully. May 10 00:50:22.241239 systemd[1]: Finished extend-filesystems.service. May 10 00:50:22.248373 env[1732]: time="2025-05-10T00:50:22.244207047Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 10 00:50:22.248373 env[1732]: time="2025-05-10T00:50:22.244245171Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 10 00:50:22.248373 env[1732]: time="2025-05-10T00:50:22.244257448Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 10 00:50:22.248373 env[1732]: time="2025-05-10T00:50:22.244296744Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 10 00:50:22.248373 env[1732]: time="2025-05-10T00:50:22.244312224Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 10 00:50:22.248373 env[1732]: time="2025-05-10T00:50:22.244324951Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 10 00:50:22.248373 env[1732]: time="2025-05-10T00:50:22.244375300Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 10 00:50:22.248373 env[1732]: time="2025-05-10T00:50:22.244389599Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 10 00:50:22.248373 env[1732]: time="2025-05-10T00:50:22.244402471Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 10 00:50:22.248373 env[1732]: time="2025-05-10T00:50:22.244414888Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 10 00:50:22.248373 env[1732]: time="2025-05-10T00:50:22.244428354Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 10 00:50:22.248373 env[1732]: time="2025-05-10T00:50:22.244440928Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 10 00:50:22.248373 env[1732]: time="2025-05-10T00:50:22.244570319Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 10 00:50:22.248373 env[1732]: time="2025-05-10T00:50:22.244640022Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 10 00:50:22.244626 systemd[1]: Started systemd-hostnamed.service. May 10 00:50:22.244511 dbus-daemon[1715]: [system] Successfully activated service 'org.freedesktop.hostname1' May 10 00:50:22.248862 env[1732]: time="2025-05-10T00:50:22.245001684Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 10 00:50:22.248862 env[1732]: time="2025-05-10T00:50:22.245029846Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 10 00:50:22.248862 env[1732]: time="2025-05-10T00:50:22.245044348Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 10 00:50:22.248862 env[1732]: time="2025-05-10T00:50:22.245084618Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 10 00:50:22.248862 env[1732]: time="2025-05-10T00:50:22.245096305Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 10 00:50:22.248862 env[1732]: time="2025-05-10T00:50:22.245107152Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 10 00:50:22.248862 env[1732]: time="2025-05-10T00:50:22.245120187Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 10 00:50:22.248862 env[1732]: time="2025-05-10T00:50:22.245131727Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 10 00:50:22.248862 env[1732]: time="2025-05-10T00:50:22.245146022Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 10 00:50:22.248862 env[1732]: time="2025-05-10T00:50:22.245157217Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 10 00:50:22.248862 env[1732]: time="2025-05-10T00:50:22.245167325Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 10 00:50:22.248862 env[1732]: time="2025-05-10T00:50:22.245179874Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 10 00:50:22.248862 env[1732]: time="2025-05-10T00:50:22.245286032Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 10 00:50:22.248862 env[1732]: time="2025-05-10T00:50:22.245302036Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 10 00:50:22.248862 env[1732]: time="2025-05-10T00:50:22.245313430Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 10 00:50:22.246631 systemd[1]: Started containerd.service. May 10 00:50:22.249228 env[1732]: time="2025-05-10T00:50:22.245323537Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 10 00:50:22.249228 env[1732]: time="2025-05-10T00:50:22.245339066Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 10 00:50:22.249228 env[1732]: time="2025-05-10T00:50:22.245349428Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 10 00:50:22.249228 env[1732]: time="2025-05-10T00:50:22.245366899Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 10 00:50:22.249228 env[1732]: time="2025-05-10T00:50:22.245399387Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 10 00:50:22.249380 env[1732]: time="2025-05-10T00:50:22.245574889Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:false] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 10 00:50:22.249380 env[1732]: time="2025-05-10T00:50:22.245621158Z" level=info msg="Connect containerd service" May 10 00:50:22.249380 env[1732]: time="2025-05-10T00:50:22.245656333Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 10 00:50:22.249380 env[1732]: time="2025-05-10T00:50:22.246162647Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:50:22.249380 env[1732]: time="2025-05-10T00:50:22.246449931Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 10 00:50:22.249380 env[1732]: time="2025-05-10T00:50:22.246501279Z" level=info msg=serving... address=/run/containerd/containerd.sock May 10 00:50:22.249380 env[1732]: time="2025-05-10T00:50:22.247307115Z" level=info msg="containerd successfully booted in 0.191838s" May 10 00:50:22.249380 env[1732]: time="2025-05-10T00:50:22.247448484Z" level=info msg="Start subscribing containerd event" May 10 00:50:22.249380 env[1732]: time="2025-05-10T00:50:22.247489539Z" level=info msg="Start recovering state" May 10 00:50:22.249380 env[1732]: time="2025-05-10T00:50:22.247636664Z" level=info msg="Start event monitor" May 10 00:50:22.249380 env[1732]: time="2025-05-10T00:50:22.247650511Z" level=info msg="Start snapshots syncer" May 10 00:50:22.249380 env[1732]: time="2025-05-10T00:50:22.247747321Z" level=info msg="Start cni network conf syncer for default" May 10 00:50:22.249380 env[1732]: time="2025-05-10T00:50:22.247756149Z" level=info msg="Start streaming server" May 10 00:50:22.250370 dbus-daemon[1715]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1762 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") May 10 00:50:22.253351 systemd[1]: Starting polkit.service... May 10 00:50:22.269079 polkitd[1807]: Started polkitd version 121 May 10 00:50:22.287343 polkitd[1807]: Loading rules from directory /etc/polkit-1/rules.d May 10 00:50:22.287418 polkitd[1807]: Loading rules from directory /usr/share/polkit-1/rules.d May 10 00:50:22.289234 polkitd[1807]: Finished loading, compiling and executing 2 rules May 10 00:50:22.289660 dbus-daemon[1715]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' May 10 00:50:22.289813 systemd[1]: Started polkit.service. May 10 00:50:22.291171 polkitd[1807]: Acquired the name org.freedesktop.PolicyKit1 on the system bus May 10 00:50:22.305372 systemd-hostnamed[1762]: Hostname set to (transient) May 10 00:50:22.315925 systemd-resolved[1658]: System hostname changed to 'ip-172-31-22-34'. May 10 00:50:22.331091 coreos-metadata[1712]: May 10 00:50:22.331 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 May 10 00:50:22.334067 coreos-metadata[1712]: May 10 00:50:22.333 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 May 10 00:50:22.334782 coreos-metadata[1712]: May 10 00:50:22.334 INFO Fetch successful May 10 00:50:22.334782 coreos-metadata[1712]: May 10 00:50:22.334 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 May 10 00:50:22.335538 coreos-metadata[1712]: May 10 00:50:22.335 INFO Fetch successful May 10 00:50:22.338880 unknown[1712]: wrote ssh authorized keys file for user: core May 10 00:50:22.358596 update-ssh-keys[1859]: Updated "/home/core/.ssh/authorized_keys" May 10 00:50:22.358928 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 10 00:50:22.556080 locksmithd[1778]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 10 00:50:22.751985 systemd-networkd[1413]: eth0: Gained IPv6LL May 10 00:50:22.754833 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 00:50:22.756219 systemd[1]: Reached target network-online.target. May 10 00:50:22.759151 systemd[1]: Started amazon-ssm-agent.service. May 10 00:50:22.764451 systemd[1]: Starting kubelet.service... May 10 00:50:22.767184 systemd[1]: Started nvidia.service. May 10 00:50:22.983594 systemd[1]: nvidia.service: Deactivated successfully. May 10 00:50:22.989897 amazon-ssm-agent[1896]: 2025/05/10 00:50:22 Failed to load instance info from vault. RegistrationKey does not exist. May 10 00:50:22.992373 amazon-ssm-agent[1896]: Initializing new seelog logger May 10 00:50:22.992373 amazon-ssm-agent[1896]: New Seelog Logger Creation Complete May 10 00:50:22.992373 amazon-ssm-agent[1896]: 2025/05/10 00:50:22 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. May 10 00:50:22.992373 amazon-ssm-agent[1896]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. May 10 00:50:22.992373 amazon-ssm-agent[1896]: 2025/05/10 00:50:22 processing appconfig overrides May 10 00:50:23.342659 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO Create new startup processor May 10 00:50:23.342784 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [LongRunningPluginsManager] registered plugins: {} May 10 00:50:23.342784 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO Initializing bookkeeping folders May 10 00:50:23.342784 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO removing the completed state files May 10 00:50:23.342784 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO Initializing bookkeeping folders for long running plugins May 10 00:50:23.342978 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO Initializing replies folder for MDS reply requests that couldn't reach the service May 10 00:50:23.342978 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO Initializing healthcheck folders for long running plugins May 10 00:50:23.342978 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO Initializing locations for inventory plugin May 10 00:50:23.342978 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO Initializing default location for custom inventory May 10 00:50:23.342978 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO Initializing default location for file inventory May 10 00:50:23.343424 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO Initializing default location for role inventory May 10 00:50:23.343523 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO Init the cloudwatchlogs publisher May 10 00:50:23.343602 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [instanceID=i-0ea405aedd8c2fbbf] Successfully loaded platform independent plugin aws:configureDocker May 10 00:50:23.343680 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [instanceID=i-0ea405aedd8c2fbbf] Successfully loaded platform independent plugin aws:runDockerAction May 10 00:50:23.343758 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [instanceID=i-0ea405aedd8c2fbbf] Successfully loaded platform independent plugin aws:refreshAssociation May 10 00:50:23.343832 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [instanceID=i-0ea405aedd8c2fbbf] Successfully loaded platform independent plugin aws:configurePackage May 10 00:50:23.343926 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [instanceID=i-0ea405aedd8c2fbbf] Successfully loaded platform independent plugin aws:runDocument May 10 00:50:23.344004 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [instanceID=i-0ea405aedd8c2fbbf] Successfully loaded platform independent plugin aws:softwareInventory May 10 00:50:23.344084 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [instanceID=i-0ea405aedd8c2fbbf] Successfully loaded platform independent plugin aws:runPowerShellScript May 10 00:50:23.344159 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [instanceID=i-0ea405aedd8c2fbbf] Successfully loaded platform independent plugin aws:updateSsmAgent May 10 00:50:23.344234 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [instanceID=i-0ea405aedd8c2fbbf] Successfully loaded platform independent plugin aws:downloadContent May 10 00:50:23.344310 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [instanceID=i-0ea405aedd8c2fbbf] Successfully loaded platform dependent plugin aws:runShellScript May 10 00:50:23.344921 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 May 10 00:50:23.345032 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO OS: linux, Arch: amd64 May 10 00:50:23.345963 amazon-ssm-agent[1896]: datastore file /var/lib/amazon/ssm/i-0ea405aedd8c2fbbf/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute May 10 00:50:23.348419 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [MessagingDeliveryService] Starting document processing engine... May 10 00:50:23.445440 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [MessagingDeliveryService] [EngineProcessor] Starting May 10 00:50:23.515453 sshd_keygen[1739]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 10 00:50:23.540658 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing May 10 00:50:23.542531 systemd[1]: Finished sshd-keygen.service. May 10 00:50:23.545811 systemd[1]: Starting issuegen.service... May 10 00:50:23.556051 systemd[1]: issuegen.service: Deactivated successfully. May 10 00:50:23.556378 systemd[1]: Finished issuegen.service. May 10 00:50:23.559636 systemd[1]: Starting systemd-user-sessions.service... May 10 00:50:23.571206 systemd[1]: Finished systemd-user-sessions.service. May 10 00:50:23.574406 systemd[1]: Started getty@tty1.service. May 10 00:50:23.579006 systemd[1]: Started serial-getty@ttyS0.service. May 10 00:50:23.580273 systemd[1]: Reached target getty.target. May 10 00:50:23.635155 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [MessagingDeliveryService] Starting message polling May 10 00:50:23.729823 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [MessagingDeliveryService] Starting send replies to MDS May 10 00:50:23.824683 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [instanceID=i-0ea405aedd8c2fbbf] Starting association polling May 10 00:50:23.906949 systemd[1]: Created slice system-sshd.slice. May 10 00:50:23.908876 systemd[1]: Started sshd@0-172.31.22.34:22-139.178.89.65:41002.service. May 10 00:50:23.921168 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting May 10 00:50:24.015102 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [MessagingDeliveryService] [Association] Launching response handler May 10 00:50:24.091744 sshd[1937]: Accepted publickey for core from 139.178.89.65 port 41002 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:50:24.094235 sshd[1937]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:24.108069 systemd[1]: Created slice user-500.slice. May 10 00:50:24.109803 systemd[1]: Starting user-runtime-dir@500.service... May 10 00:50:24.110970 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing May 10 00:50:24.118780 systemd-logind[1721]: New session 1 of user core. May 10 00:50:24.123301 systemd[1]: Finished user-runtime-dir@500.service. May 10 00:50:24.125307 systemd[1]: Starting user@500.service... May 10 00:50:24.131820 (systemd)[1942]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:24.206307 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service May 10 00:50:24.230509 systemd[1942]: Queued start job for default target default.target. May 10 00:50:24.231086 systemd[1942]: Reached target paths.target. May 10 00:50:24.231223 systemd[1942]: Reached target sockets.target. May 10 00:50:24.231288 systemd[1942]: Reached target timers.target. May 10 00:50:24.231344 systemd[1942]: Reached target basic.target. May 10 00:50:24.231510 systemd[1]: Started user@500.service. May 10 00:50:24.232915 systemd[1942]: Reached target default.target. May 10 00:50:24.232960 systemd[1942]: Startup finished in 94ms. May 10 00:50:24.233021 systemd[1]: Started session-1.scope. May 10 00:50:24.302125 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized May 10 00:50:24.368086 systemd[1]: Started sshd@1-172.31.22.34:22-139.178.89.65:41004.service. May 10 00:50:24.398207 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [OfflineService] Starting document processing engine... May 10 00:50:24.494780 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [OfflineService] [EngineProcessor] Starting May 10 00:50:24.531314 sshd[1951]: Accepted publickey for core from 139.178.89.65 port 41004 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:50:24.533157 sshd[1951]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:24.538399 systemd-logind[1721]: New session 2 of user core. May 10 00:50:24.539053 systemd[1]: Started session-2.scope. May 10 00:50:24.591015 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [OfflineService] [EngineProcessor] Initial processing May 10 00:50:24.666415 sshd[1951]: pam_unix(sshd:session): session closed for user core May 10 00:50:24.669043 systemd[1]: sshd@1-172.31.22.34:22-139.178.89.65:41004.service: Deactivated successfully. May 10 00:50:24.669764 systemd[1]: session-2.scope: Deactivated successfully. May 10 00:50:24.671248 systemd-logind[1721]: Session 2 logged out. Waiting for processes to exit. May 10 00:50:24.672234 systemd-logind[1721]: Removed session 2. May 10 00:50:24.688338 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [OfflineService] Starting message polling May 10 00:50:24.691244 systemd[1]: Started sshd@2-172.31.22.34:22-139.178.89.65:41006.service. May 10 00:50:24.743950 systemd[1]: Started kubelet.service. May 10 00:50:24.744984 systemd[1]: Reached target multi-user.target. May 10 00:50:24.747378 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 10 00:50:24.755419 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 10 00:50:24.755643 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 10 00:50:24.757636 systemd[1]: Startup finished in 6.601s (kernel) + 8.658s (userspace) = 15.259s. May 10 00:50:24.785149 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [OfflineService] Starting send replies to MDS May 10 00:50:24.865566 sshd[1958]: Accepted publickey for core from 139.178.89.65 port 41006 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:50:24.867008 sshd[1958]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:24.872757 systemd[1]: Started session-3.scope. May 10 00:50:24.873062 systemd-logind[1721]: New session 3 of user core. May 10 00:50:24.882392 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [LongRunningPluginsManager] starting long running plugin manager May 10 00:50:24.979600 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute May 10 00:50:25.002031 sshd[1958]: pam_unix(sshd:session): session closed for user core May 10 00:50:25.005416 systemd[1]: sshd@2-172.31.22.34:22-139.178.89.65:41006.service: Deactivated successfully. May 10 00:50:25.006466 systemd[1]: session-3.scope: Deactivated successfully. May 10 00:50:25.007364 systemd-logind[1721]: Session 3 logged out. Waiting for processes to exit. May 10 00:50:25.008903 systemd-logind[1721]: Removed session 3. May 10 00:50:25.077049 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [HealthCheck] HealthCheck reporting agent health. May 10 00:50:25.174632 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [MessageGatewayService] Starting session document processing engine... May 10 00:50:25.272671 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [MessageGatewayService] [EngineProcessor] Starting May 10 00:50:25.370663 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. May 10 00:50:25.468875 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0ea405aedd8c2fbbf, requestId: 181a8633-22ac-42cd-9f91-c28d2f5409f3 May 10 00:50:25.567620 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [MessageGatewayService] listening reply. May 10 00:50:25.665958 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [StartupProcessor] Executing startup processor tasks May 10 00:50:25.767133 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running May 10 00:50:25.866210 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk May 10 00:50:25.891589 kubelet[1965]: E0510 00:50:25.891524 1965 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:50:25.893912 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:50:25.894148 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:50:25.965347 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.7 May 10 00:50:26.064812 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck May 10 00:50:26.164644 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0ea405aedd8c2fbbf?role=subscribe&stream=input May 10 00:50:26.264454 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0ea405aedd8c2fbbf?role=subscribe&stream=input May 10 00:50:26.364554 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [MessageGatewayService] Starting receiving message from control channel May 10 00:50:26.464872 amazon-ssm-agent[1896]: 2025-05-10 00:50:23 INFO [MessageGatewayService] [EngineProcessor] Initial processing May 10 00:50:35.025662 systemd[1]: Started sshd@3-172.31.22.34:22-139.178.89.65:54762.service. May 10 00:50:35.189565 sshd[1980]: Accepted publickey for core from 139.178.89.65 port 54762 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:50:35.191029 sshd[1980]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:35.195930 systemd-logind[1721]: New session 4 of user core. May 10 00:50:35.196573 systemd[1]: Started session-4.scope. May 10 00:50:35.325098 sshd[1980]: pam_unix(sshd:session): session closed for user core May 10 00:50:35.328586 systemd[1]: sshd@3-172.31.22.34:22-139.178.89.65:54762.service: Deactivated successfully. May 10 00:50:35.330082 systemd[1]: session-4.scope: Deactivated successfully. May 10 00:50:35.330115 systemd-logind[1721]: Session 4 logged out. Waiting for processes to exit. May 10 00:50:35.331461 systemd-logind[1721]: Removed session 4. May 10 00:50:35.347593 systemd[1]: Started sshd@4-172.31.22.34:22-139.178.89.65:54772.service. May 10 00:50:35.506222 sshd[1987]: Accepted publickey for core from 139.178.89.65 port 54772 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:50:35.507537 sshd[1987]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:35.512266 systemd[1]: Started session-5.scope. May 10 00:50:35.512647 systemd-logind[1721]: New session 5 of user core. May 10 00:50:35.634002 sshd[1987]: pam_unix(sshd:session): session closed for user core May 10 00:50:35.637506 systemd[1]: sshd@4-172.31.22.34:22-139.178.89.65:54772.service: Deactivated successfully. May 10 00:50:35.638903 systemd-logind[1721]: Session 5 logged out. Waiting for processes to exit. May 10 00:50:35.639008 systemd[1]: session-5.scope: Deactivated successfully. May 10 00:50:35.640437 systemd-logind[1721]: Removed session 5. May 10 00:50:35.658378 systemd[1]: Started sshd@5-172.31.22.34:22-139.178.89.65:54776.service. May 10 00:50:35.818896 sshd[1994]: Accepted publickey for core from 139.178.89.65 port 54776 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:50:35.820232 sshd[1994]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:35.825085 systemd[1]: Started session-6.scope. May 10 00:50:35.825418 systemd-logind[1721]: New session 6 of user core. May 10 00:50:35.930863 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 10 00:50:35.931010 systemd[1]: Stopped kubelet.service. May 10 00:50:35.932534 systemd[1]: Starting kubelet.service... May 10 00:50:35.952748 sshd[1994]: pam_unix(sshd:session): session closed for user core May 10 00:50:35.957559 systemd[1]: sshd@5-172.31.22.34:22-139.178.89.65:54776.service: Deactivated successfully. May 10 00:50:35.958739 systemd[1]: session-6.scope: Deactivated successfully. May 10 00:50:35.961088 systemd-logind[1721]: Session 6 logged out. Waiting for processes to exit. May 10 00:50:35.962436 systemd-logind[1721]: Removed session 6. May 10 00:50:35.976110 systemd[1]: Started sshd@6-172.31.22.34:22-139.178.89.65:54786.service. May 10 00:50:36.102352 systemd[1]: Started kubelet.service. May 10 00:50:36.138544 sshd[2004]: Accepted publickey for core from 139.178.89.65 port 54786 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:50:36.139230 sshd[2004]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:36.145263 systemd[1]: Started session-7.scope. May 10 00:50:36.146679 systemd-logind[1721]: New session 7 of user core. May 10 00:50:36.167954 kubelet[2010]: E0510 00:50:36.167922 2010 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:50:36.171487 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:50:36.171692 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:50:36.264536 sudo[2021]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 10 00:50:36.264796 sudo[2021]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:50:36.273108 dbus-daemon[1715]: Ѝ$6\xb4U: received setenforce notice (enforcing=1001465808) May 10 00:50:36.275087 sudo[2021]: pam_unix(sudo:session): session closed for user root May 10 00:50:36.298784 sshd[2004]: pam_unix(sshd:session): session closed for user core May 10 00:50:36.302135 systemd[1]: sshd@6-172.31.22.34:22-139.178.89.65:54786.service: Deactivated successfully. May 10 00:50:36.303117 systemd[1]: session-7.scope: Deactivated successfully. May 10 00:50:36.303508 systemd-logind[1721]: Session 7 logged out. Waiting for processes to exit. May 10 00:50:36.304342 systemd-logind[1721]: Removed session 7. May 10 00:50:36.323351 systemd[1]: Started sshd@7-172.31.22.34:22-139.178.89.65:54794.service. May 10 00:50:36.489302 sshd[2025]: Accepted publickey for core from 139.178.89.65 port 54794 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:50:36.490659 sshd[2025]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:36.495343 systemd[1]: Started session-8.scope. May 10 00:50:36.495687 systemd-logind[1721]: New session 8 of user core. May 10 00:50:36.602932 sudo[2030]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 10 00:50:36.603163 sudo[2030]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:50:36.607770 sudo[2030]: pam_unix(sudo:session): session closed for user root May 10 00:50:36.613334 sudo[2029]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 10 00:50:36.613659 sudo[2029]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:50:36.624228 systemd[1]: Stopping audit-rules.service... May 10 00:50:36.625000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:50:36.627266 kernel: kauditd_printk_skb: 171 callbacks suppressed May 10 00:50:36.627324 kernel: audit: type=1305 audit(1746838236.625:158): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:50:36.627351 auditctl[2033]: No rules May 10 00:50:36.625000 audit[2033]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd6026d900 a2=420 a3=0 items=0 ppid=1 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:36.627893 systemd[1]: audit-rules.service: Deactivated successfully. May 10 00:50:36.628187 systemd[1]: Stopped audit-rules.service. May 10 00:50:36.631614 systemd[1]: Starting audit-rules.service... May 10 00:50:36.634036 kernel: audit: type=1300 audit(1746838236.625:158): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd6026d900 a2=420 a3=0 items=0 ppid=1 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:36.641390 kernel: audit: type=1327 audit(1746838236.625:158): proctitle=2F7362696E2F617564697463746C002D44 May 10 00:50:36.641504 kernel: audit: type=1131 audit(1746838236.627:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:36.625000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 10 00:50:36.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:36.658177 augenrules[2051]: No rules May 10 00:50:36.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:36.658831 systemd[1]: Finished audit-rules.service. May 10 00:50:36.663236 sudo[2029]: pam_unix(sudo:session): session closed for user root May 10 00:50:36.663864 kernel: audit: type=1130 audit(1746838236.658:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:36.662000 audit[2029]: USER_END pid=2029 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:36.662000 audit[2029]: CRED_DISP pid=2029 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:36.671757 kernel: audit: type=1106 audit(1746838236.662:161): pid=2029 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:36.671830 kernel: audit: type=1104 audit(1746838236.662:162): pid=2029 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:36.686957 sshd[2025]: pam_unix(sshd:session): session closed for user core May 10 00:50:36.694264 kernel: audit: type=1106 audit(1746838236.687:163): pid=2025 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:36.687000 audit[2025]: USER_END pid=2025 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:36.690635 systemd[1]: sshd@7-172.31.22.34:22-139.178.89.65:54794.service: Deactivated successfully. May 10 00:50:36.691587 systemd[1]: session-8.scope: Deactivated successfully. May 10 00:50:36.694871 systemd-logind[1721]: Session 8 logged out. Waiting for processes to exit. May 10 00:50:36.687000 audit[2025]: CRED_DISP pid=2025 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:36.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.22.34:22-139.178.89.65:54794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:36.699625 systemd-logind[1721]: Removed session 8. May 10 00:50:36.705472 kernel: audit: type=1104 audit(1746838236.687:164): pid=2025 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:36.705565 kernel: audit: type=1131 audit(1746838236.687:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.22.34:22-139.178.89.65:54794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:36.711165 systemd[1]: Started sshd@8-172.31.22.34:22-139.178.89.65:45920.service. May 10 00:50:36.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.22.34:22-139.178.89.65:45920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:36.876000 audit[2058]: USER_ACCT pid=2058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:36.878056 sshd[2058]: Accepted publickey for core from 139.178.89.65 port 45920 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:50:36.877000 audit[2058]: CRED_ACQ pid=2058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:36.877000 audit[2058]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfcd08200 a2=3 a3=0 items=0 ppid=1 pid=2058 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:36.877000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:36.878701 sshd[2058]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:36.883327 systemd[1]: Started session-9.scope. May 10 00:50:36.883535 systemd-logind[1721]: New session 9 of user core. May 10 00:50:36.889000 audit[2058]: USER_START pid=2058 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:36.891000 audit[2061]: CRED_ACQ pid=2061 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:36.989000 audit[2062]: USER_ACCT pid=2062 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:36.989000 audit[2062]: CRED_REFR pid=2062 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:36.990266 sudo[2062]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 10 00:50:36.990498 sudo[2062]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:50:36.991000 audit[2062]: USER_START pid=2062 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:37.005669 systemd[1]: Starting coreos-metadata.service... May 10 00:50:37.086134 coreos-metadata[2066]: May 10 00:50:37.085 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 May 10 00:50:37.087014 coreos-metadata[2066]: May 10 00:50:37.086 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 May 10 00:50:37.087713 coreos-metadata[2066]: May 10 00:50:37.087 INFO Fetch successful May 10 00:50:37.087823 coreos-metadata[2066]: May 10 00:50:37.087 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 May 10 00:50:37.088381 coreos-metadata[2066]: May 10 00:50:37.088 INFO Fetch successful May 10 00:50:37.088622 coreos-metadata[2066]: May 10 00:50:37.088 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 May 10 00:50:37.089443 coreos-metadata[2066]: May 10 00:50:37.089 INFO Fetch successful May 10 00:50:37.089530 coreos-metadata[2066]: May 10 00:50:37.089 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 May 10 00:50:37.090222 coreos-metadata[2066]: May 10 00:50:37.090 INFO Fetch successful May 10 00:50:37.090222 coreos-metadata[2066]: May 10 00:50:37.090 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 May 10 00:50:37.091026 coreos-metadata[2066]: May 10 00:50:37.091 INFO Fetch successful May 10 00:50:37.091146 coreos-metadata[2066]: May 10 00:50:37.091 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 May 10 00:50:37.091736 coreos-metadata[2066]: May 10 00:50:37.091 INFO Fetch successful May 10 00:50:37.091736 coreos-metadata[2066]: May 10 00:50:37.091 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 May 10 00:50:37.092335 coreos-metadata[2066]: May 10 00:50:37.092 INFO Fetch successful May 10 00:50:37.092425 coreos-metadata[2066]: May 10 00:50:37.092 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 May 10 00:50:37.093061 coreos-metadata[2066]: May 10 00:50:37.093 INFO Fetch successful May 10 00:50:37.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:37.102510 systemd[1]: Finished coreos-metadata.service. May 10 00:50:38.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:38.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:38.165801 systemd[1]: Stopped kubelet.service. May 10 00:50:38.169267 systemd[1]: Starting kubelet.service... May 10 00:50:38.196953 systemd[1]: Reloading. May 10 00:50:38.298963 /usr/lib/systemd/system-generators/torcx-generator[2130]: time="2025-05-10T00:50:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:50:38.298993 /usr/lib/systemd/system-generators/torcx-generator[2130]: time="2025-05-10T00:50:38Z" level=info msg="torcx already run" May 10 00:50:38.408030 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:50:38.408052 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:50:38.427094 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:50:38.536245 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 10 00:50:38.536351 systemd[1]: kubelet.service: Failed with result 'signal'. May 10 00:50:38.536786 systemd[1]: Stopped kubelet.service. May 10 00:50:38.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:50:38.539453 systemd[1]: Starting kubelet.service... May 10 00:50:38.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:38.696575 systemd[1]: Started kubelet.service. May 10 00:50:38.749672 kubelet[2201]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:50:38.749672 kubelet[2201]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 00:50:38.749672 kubelet[2201]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:50:38.751331 kubelet[2201]: I0510 00:50:38.751288 2201 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:50:39.148479 kubelet[2201]: I0510 00:50:39.148438 2201 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 10 00:50:39.148479 kubelet[2201]: I0510 00:50:39.148464 2201 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:50:39.148769 kubelet[2201]: I0510 00:50:39.148738 2201 server.go:927] "Client rotation is on, will bootstrap in background" May 10 00:50:39.167524 kubelet[2201]: I0510 00:50:39.167472 2201 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:50:39.184583 kubelet[2201]: I0510 00:50:39.184474 2201 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:50:39.187955 kubelet[2201]: I0510 00:50:39.187894 2201 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:50:39.188252 kubelet[2201]: I0510 00:50:39.187959 2201 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.31.22.34","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"cgroupfs","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 10 00:50:39.188632 kubelet[2201]: I0510 00:50:39.188609 2201 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:50:39.188632 kubelet[2201]: I0510 00:50:39.188632 2201 container_manager_linux.go:301] "Creating device plugin manager" May 10 00:50:39.190120 kubelet[2201]: I0510 00:50:39.190095 2201 state_mem.go:36] "Initialized new in-memory state store" May 10 00:50:39.191641 kubelet[2201]: I0510 00:50:39.191619 2201 kubelet.go:400] "Attempting to sync node with API server" May 10 00:50:39.191641 kubelet[2201]: I0510 00:50:39.191642 2201 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:50:39.191744 kubelet[2201]: I0510 00:50:39.191663 2201 kubelet.go:312] "Adding apiserver pod source" May 10 00:50:39.191744 kubelet[2201]: I0510 00:50:39.191677 2201 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:50:39.192189 kubelet[2201]: E0510 00:50:39.192145 2201 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:50:39.192348 kubelet[2201]: E0510 00:50:39.192330 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:50:39.197533 kubelet[2201]: I0510 00:50:39.197505 2201 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:50:39.198339 kubelet[2201]: W0510 00:50:39.198302 2201 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "172.31.22.34" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope May 10 00:50:39.198453 kubelet[2201]: E0510 00:50:39.198348 2201 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.22.34" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope May 10 00:50:39.200035 kubelet[2201]: I0510 00:50:39.200007 2201 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:50:39.200127 kubelet[2201]: W0510 00:50:39.200074 2201 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 10 00:50:39.200746 kubelet[2201]: I0510 00:50:39.200730 2201 server.go:1264] "Started kubelet" May 10 00:50:39.209000 audit[2201]: AVC avc: denied { mac_admin } for pid=2201 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.209000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:50:39.209000 audit[2201]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00039d7a0 a1=c000bdb3e0 a2=c00039d6e0 a3=25 items=0 ppid=1 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:39.209000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:50:39.209000 audit[2201]: AVC avc: denied { mac_admin } for pid=2201 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.209000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:50:39.209000 audit[2201]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008d8780 a1=c000bdb3f8 a2=c00039d950 a3=25 items=0 ppid=1 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:39.209000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:50:39.211022 kubelet[2201]: I0510 00:50:39.210618 2201 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:50:39.211022 kubelet[2201]: I0510 00:50:39.210663 2201 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 00:50:39.211022 kubelet[2201]: I0510 00:50:39.210720 2201 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:50:39.218402 kubelet[2201]: E0510 00:50:39.218368 2201 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:50:39.218523 kubelet[2201]: I0510 00:50:39.218478 2201 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:50:39.219445 kubelet[2201]: I0510 00:50:39.219426 2201 server.go:455] "Adding debug handlers to kubelet server" May 10 00:50:39.220305 kubelet[2201]: I0510 00:50:39.220258 2201 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:50:39.220456 kubelet[2201]: I0510 00:50:39.220443 2201 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:50:39.223173 kubelet[2201]: E0510 00:50:39.223033 2201 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.22.34.183e041f97a06ef9 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.22.34,UID:172.31.22.34,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:172.31.22.34,},FirstTimestamp:2025-05-10 00:50:39.200702201 +0000 UTC m=+0.495494993,LastTimestamp:2025-05-10 00:50:39.200702201 +0000 UTC m=+0.495494993,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.22.34,}" May 10 00:50:39.223353 kubelet[2201]: W0510 00:50:39.223335 2201 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope May 10 00:50:39.223394 kubelet[2201]: E0510 00:50:39.223362 2201 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope May 10 00:50:39.223591 kubelet[2201]: I0510 00:50:39.223578 2201 volume_manager.go:291] "Starting Kubelet Volume Manager" May 10 00:50:39.224023 kubelet[2201]: I0510 00:50:39.224006 2201 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 00:50:39.224151 kubelet[2201]: I0510 00:50:39.224136 2201 reconciler.go:26] "Reconciler: start to sync state" May 10 00:50:39.226858 kubelet[2201]: I0510 00:50:39.224593 2201 factory.go:221] Registration of the systemd container factory successfully May 10 00:50:39.226858 kubelet[2201]: I0510 00:50:39.224660 2201 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:50:39.227479 kubelet[2201]: I0510 00:50:39.227464 2201 factory.go:221] Registration of the containerd container factory successfully May 10 00:50:39.240102 kubelet[2201]: W0510 00:50:39.240054 2201 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope May 10 00:50:39.240102 kubelet[2201]: E0510 00:50:39.240100 2201 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope May 10 00:50:39.250644 kubelet[2201]: I0510 00:50:39.250340 2201 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 00:50:39.250644 kubelet[2201]: I0510 00:50:39.250353 2201 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 00:50:39.250644 kubelet[2201]: I0510 00:50:39.250369 2201 state_mem.go:36] "Initialized new in-memory state store" May 10 00:50:39.259871 kubelet[2201]: E0510 00:50:39.254315 2201 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.31.22.34\" not found" node="172.31.22.34" May 10 00:50:39.259871 kubelet[2201]: I0510 00:50:39.256658 2201 policy_none.go:49] "None policy: Start" May 10 00:50:39.259871 kubelet[2201]: I0510 00:50:39.257625 2201 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 00:50:39.259871 kubelet[2201]: I0510 00:50:39.257647 2201 state_mem.go:35] "Initializing new in-memory state store" May 10 00:50:39.265161 kubelet[2201]: I0510 00:50:39.265137 2201 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:50:39.264000 audit[2201]: AVC avc: denied { mac_admin } for pid=2201 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.264000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:50:39.264000 audit[2201]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000fb5e00 a1=c000fb0d08 a2=c000fb5dd0 a3=25 items=0 ppid=1 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:39.264000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:50:39.265545 kubelet[2201]: I0510 00:50:39.265530 2201 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:50:39.265713 kubelet[2201]: I0510 00:50:39.265683 2201 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:50:39.265839 kubelet[2201]: I0510 00:50:39.265831 2201 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:50:39.268997 kubelet[2201]: E0510 00:50:39.268977 2201 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.22.34\" not found" May 10 00:50:39.275000 audit[2217]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:39.275000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdd70bfdf0 a2=0 a3=7ffdd70bfddc items=0 ppid=2201 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:39.275000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:50:39.277000 audit[2220]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:39.277000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc635bcff0 a2=0 a3=7ffc635bcfdc items=0 ppid=2201 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:39.277000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:50:39.282000 audit[2222]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:39.282000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe2a0c6f70 a2=0 a3=7ffe2a0c6f5c items=0 ppid=2201 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:39.282000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:50:39.302000 audit[2227]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:39.302000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc51fe36d0 a2=0 a3=7ffc51fe36bc items=0 ppid=2201 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:39.302000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:50:39.325247 kubelet[2201]: I0510 00:50:39.325225 2201 kubelet_node_status.go:73] "Attempting to register node" node="172.31.22.34" May 10 00:50:39.336476 kubelet[2201]: I0510 00:50:39.336444 2201 kubelet_node_status.go:76] "Successfully registered node" node="172.31.22.34" May 10 00:50:39.345879 kubelet[2201]: E0510 00:50:39.344735 2201 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.34\" not found" May 10 00:50:39.356000 audit[2232]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:39.356000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe6bd33550 a2=0 a3=7ffe6bd3353c items=0 ppid=2201 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:39.356000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 10 00:50:39.357971 kubelet[2201]: I0510 00:50:39.357930 2201 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:50:39.358000 audit[2233]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:39.358000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffef264efb0 a2=0 a3=7ffef264ef9c items=0 ppid=2201 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:39.358000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:50:39.359555 kubelet[2201]: I0510 00:50:39.359509 2201 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:50:39.359555 kubelet[2201]: I0510 00:50:39.359550 2201 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 00:50:39.359661 kubelet[2201]: I0510 00:50:39.359574 2201 kubelet.go:2337] "Starting kubelet main sync loop" May 10 00:50:39.359661 kubelet[2201]: E0510 00:50:39.359624 2201 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 10 00:50:39.359000 audit[2234]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:39.359000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3df74310 a2=0 a3=7ffc3df742fc items=0 ppid=2201 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:39.359000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:50:39.361000 audit[2235]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:39.361000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5186e220 a2=0 a3=7fff5186e20c items=0 ppid=2201 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:39.361000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:50:39.362000 audit[2236]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:39.362000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffda04ef1f0 a2=0 a3=7ffda04ef1dc items=0 ppid=2201 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:39.362000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:50:39.362000 audit[2238]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:39.362000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe786324f0 a2=0 a3=7ffe786324dc items=0 ppid=2201 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:39.362000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:50:39.364000 audit[2239]: NETFILTER_CFG table=filter:12 family=10 entries=2 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:39.364000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff6ae46550 a2=0 a3=7fff6ae4653c items=0 ppid=2201 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:39.364000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:50:39.364000 audit[2240]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:39.364000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca382e7e0 a2=0 a3=7ffca382e7cc items=0 ppid=2201 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:39.364000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:50:39.445593 kubelet[2201]: E0510 00:50:39.445487 2201 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.34\" not found" May 10 00:50:39.546302 kubelet[2201]: E0510 00:50:39.546249 2201 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.34\" not found" May 10 00:50:39.646960 kubelet[2201]: E0510 00:50:39.646921 2201 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.34\" not found" May 10 00:50:39.719000 audit[2062]: USER_END pid=2062 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:39.719000 audit[2062]: CRED_DISP pid=2062 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:39.720160 sudo[2062]: pam_unix(sudo:session): session closed for user root May 10 00:50:39.743599 sshd[2058]: pam_unix(sshd:session): session closed for user core May 10 00:50:39.743000 audit[2058]: USER_END pid=2058 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:39.744000 audit[2058]: CRED_DISP pid=2058 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:39.746303 systemd[1]: sshd@8-172.31.22.34:22-139.178.89.65:45920.service: Deactivated successfully. May 10 00:50:39.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.22.34:22-139.178.89.65:45920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:39.747374 kubelet[2201]: E0510 00:50:39.747351 2201 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.34\" not found" May 10 00:50:39.747466 systemd[1]: session-9.scope: Deactivated successfully. May 10 00:50:39.748073 systemd-logind[1721]: Session 9 logged out. Waiting for processes to exit. May 10 00:50:39.748889 systemd-logind[1721]: Removed session 9. May 10 00:50:39.848100 kubelet[2201]: E0510 00:50:39.848056 2201 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.34\" not found" May 10 00:50:39.948862 kubelet[2201]: E0510 00:50:39.948813 2201 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.34\" not found" May 10 00:50:40.049484 kubelet[2201]: E0510 00:50:40.049429 2201 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.34\" not found" May 10 00:50:40.149801 kubelet[2201]: E0510 00:50:40.149755 2201 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"172.31.22.34\" not found" May 10 00:50:40.150943 kubelet[2201]: I0510 00:50:40.150889 2201 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 10 00:50:40.151066 kubelet[2201]: W0510 00:50:40.151049 2201 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 10 00:50:40.151105 kubelet[2201]: W0510 00:50:40.151081 2201 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 10 00:50:40.193207 kubelet[2201]: I0510 00:50:40.193172 2201 apiserver.go:52] "Watching apiserver" May 10 00:50:40.193399 kubelet[2201]: E0510 00:50:40.193202 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:50:40.201096 kubelet[2201]: I0510 00:50:40.201041 2201 topology_manager.go:215] "Topology Admit Handler" podUID="603f2066-be7b-4650-a9cd-3671e70e40c2" podNamespace="calico-system" podName="calico-node-jzsq8" May 10 00:50:40.201231 kubelet[2201]: I0510 00:50:40.201172 2201 topology_manager.go:215] "Topology Admit Handler" podUID="7ca0d162-d418-45c7-a797-62fb2e6f50f3" podNamespace="calico-system" podName="csi-node-driver-p22k7" May 10 00:50:40.201263 kubelet[2201]: I0510 00:50:40.201245 2201 topology_manager.go:215] "Topology Admit Handler" podUID="24cc23fd-e2e6-48bd-9ec6-546eea0bf00a" podNamespace="kube-system" podName="kube-proxy-f7pb6" May 10 00:50:40.201975 kubelet[2201]: E0510 00:50:40.201949 2201 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p22k7" podUID="7ca0d162-d418-45c7-a797-62fb2e6f50f3" May 10 00:50:40.224977 kubelet[2201]: I0510 00:50:40.224950 2201 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 00:50:40.230582 kubelet[2201]: I0510 00:50:40.230542 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/603f2066-be7b-4650-a9cd-3671e70e40c2-tigera-ca-bundle\") pod \"calico-node-jzsq8\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " pod="calico-system/calico-node-jzsq8" May 10 00:50:40.230582 kubelet[2201]: I0510 00:50:40.230586 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-var-lib-calico\") pod \"calico-node-jzsq8\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " pod="calico-system/calico-node-jzsq8" May 10 00:50:40.230749 kubelet[2201]: I0510 00:50:40.230607 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/7ca0d162-d418-45c7-a797-62fb2e6f50f3-kubelet-dir\") pod \"csi-node-driver-p22k7\" (UID: \"7ca0d162-d418-45c7-a797-62fb2e6f50f3\") " pod="calico-system/csi-node-driver-p22k7" May 10 00:50:40.230749 kubelet[2201]: I0510 00:50:40.230623 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/7ca0d162-d418-45c7-a797-62fb2e6f50f3-registration-dir\") pod \"csi-node-driver-p22k7\" (UID: \"7ca0d162-d418-45c7-a797-62fb2e6f50f3\") " pod="calico-system/csi-node-driver-p22k7" May 10 00:50:40.230749 kubelet[2201]: I0510 00:50:40.230639 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/24cc23fd-e2e6-48bd-9ec6-546eea0bf00a-xtables-lock\") pod \"kube-proxy-f7pb6\" (UID: \"24cc23fd-e2e6-48bd-9ec6-546eea0bf00a\") " pod="kube-system/kube-proxy-f7pb6" May 10 00:50:40.230749 kubelet[2201]: I0510 00:50:40.230656 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-xtables-lock\") pod \"calico-node-jzsq8\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " pod="calico-system/calico-node-jzsq8" May 10 00:50:40.230749 kubelet[2201]: I0510 00:50:40.230670 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-var-run-calico\") pod \"calico-node-jzsq8\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " pod="calico-system/calico-node-jzsq8" May 10 00:50:40.230915 kubelet[2201]: I0510 00:50:40.230684 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/7ca0d162-d418-45c7-a797-62fb2e6f50f3-varrun\") pod \"csi-node-driver-p22k7\" (UID: \"7ca0d162-d418-45c7-a797-62fb2e6f50f3\") " pod="calico-system/csi-node-driver-p22k7" May 10 00:50:40.230915 kubelet[2201]: I0510 00:50:40.230700 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/603f2066-be7b-4650-a9cd-3671e70e40c2-node-certs\") pod \"calico-node-jzsq8\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " pod="calico-system/calico-node-jzsq8" May 10 00:50:40.230915 kubelet[2201]: I0510 00:50:40.230715 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-policysync\") pod \"calico-node-jzsq8\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " pod="calico-system/calico-node-jzsq8" May 10 00:50:40.230915 kubelet[2201]: I0510 00:50:40.230738 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-cni-bin-dir\") pod \"calico-node-jzsq8\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " pod="calico-system/calico-node-jzsq8" May 10 00:50:40.230915 kubelet[2201]: I0510 00:50:40.230752 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-cni-log-dir\") pod \"calico-node-jzsq8\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " pod="calico-system/calico-node-jzsq8" May 10 00:50:40.231043 kubelet[2201]: I0510 00:50:40.230766 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8mvlr\" (UniqueName: \"kubernetes.io/projected/603f2066-be7b-4650-a9cd-3671e70e40c2-kube-api-access-8mvlr\") pod \"calico-node-jzsq8\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " pod="calico-system/calico-node-jzsq8" May 10 00:50:40.231043 kubelet[2201]: I0510 00:50:40.230783 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/7ca0d162-d418-45c7-a797-62fb2e6f50f3-socket-dir\") pod \"csi-node-driver-p22k7\" (UID: \"7ca0d162-d418-45c7-a797-62fb2e6f50f3\") " pod="calico-system/csi-node-driver-p22k7" May 10 00:50:40.231043 kubelet[2201]: I0510 00:50:40.230798 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-lib-modules\") pod \"calico-node-jzsq8\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " pod="calico-system/calico-node-jzsq8" May 10 00:50:40.231043 kubelet[2201]: I0510 00:50:40.230812 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-flexvol-driver-host\") pod \"calico-node-jzsq8\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " pod="calico-system/calico-node-jzsq8" May 10 00:50:40.231043 kubelet[2201]: I0510 00:50:40.230826 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tzzd4\" (UniqueName: \"kubernetes.io/projected/7ca0d162-d418-45c7-a797-62fb2e6f50f3-kube-api-access-tzzd4\") pod \"csi-node-driver-p22k7\" (UID: \"7ca0d162-d418-45c7-a797-62fb2e6f50f3\") " pod="calico-system/csi-node-driver-p22k7" May 10 00:50:40.231166 kubelet[2201]: I0510 00:50:40.230961 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/24cc23fd-e2e6-48bd-9ec6-546eea0bf00a-kube-proxy\") pod \"kube-proxy-f7pb6\" (UID: \"24cc23fd-e2e6-48bd-9ec6-546eea0bf00a\") " pod="kube-system/kube-proxy-f7pb6" May 10 00:50:40.231166 kubelet[2201]: I0510 00:50:40.230977 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/24cc23fd-e2e6-48bd-9ec6-546eea0bf00a-lib-modules\") pod \"kube-proxy-f7pb6\" (UID: \"24cc23fd-e2e6-48bd-9ec6-546eea0bf00a\") " pod="kube-system/kube-proxy-f7pb6" May 10 00:50:40.231166 kubelet[2201]: I0510 00:50:40.230991 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v62ld\" (UniqueName: \"kubernetes.io/projected/24cc23fd-e2e6-48bd-9ec6-546eea0bf00a-kube-api-access-v62ld\") pod \"kube-proxy-f7pb6\" (UID: \"24cc23fd-e2e6-48bd-9ec6-546eea0bf00a\") " pod="kube-system/kube-proxy-f7pb6" May 10 00:50:40.231166 kubelet[2201]: I0510 00:50:40.231030 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-cni-net-dir\") pod \"calico-node-jzsq8\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " pod="calico-system/calico-node-jzsq8" May 10 00:50:40.250652 kubelet[2201]: I0510 00:50:40.250627 2201 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 10 00:50:40.251050 env[1732]: time="2025-05-10T00:50:40.250972276Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 10 00:50:40.251351 kubelet[2201]: I0510 00:50:40.251119 2201 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 10 00:50:40.334080 kubelet[2201]: E0510 00:50:40.334005 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:40.334080 kubelet[2201]: W0510 00:50:40.334027 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:40.334080 kubelet[2201]: E0510 00:50:40.334049 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:40.340681 kubelet[2201]: E0510 00:50:40.340651 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:40.340681 kubelet[2201]: W0510 00:50:40.340679 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:40.340832 kubelet[2201]: E0510 00:50:40.340699 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:40.360106 kubelet[2201]: E0510 00:50:40.352685 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:40.360106 kubelet[2201]: W0510 00:50:40.352710 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:40.360106 kubelet[2201]: E0510 00:50:40.352729 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:40.360106 kubelet[2201]: E0510 00:50:40.355713 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:40.360106 kubelet[2201]: W0510 00:50:40.355727 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:40.360106 kubelet[2201]: E0510 00:50:40.355752 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:40.362807 kubelet[2201]: E0510 00:50:40.362781 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:40.362807 kubelet[2201]: W0510 00:50:40.362799 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:40.362973 kubelet[2201]: E0510 00:50:40.362818 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:40.505376 env[1732]: time="2025-05-10T00:50:40.505198255Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-f7pb6,Uid:24cc23fd-e2e6-48bd-9ec6-546eea0bf00a,Namespace:kube-system,Attempt:0,}" May 10 00:50:40.505376 env[1732]: time="2025-05-10T00:50:40.505213032Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jzsq8,Uid:603f2066-be7b-4650-a9cd-3671e70e40c2,Namespace:calico-system,Attempt:0,}" May 10 00:50:41.036779 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1581820211.mount: Deactivated successfully. May 10 00:50:41.050031 env[1732]: time="2025-05-10T00:50:41.049979515Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:41.056032 env[1732]: time="2025-05-10T00:50:41.055991907Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:41.058343 env[1732]: time="2025-05-10T00:50:41.058303242Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:41.062310 env[1732]: time="2025-05-10T00:50:41.062268715Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:41.064907 env[1732]: time="2025-05-10T00:50:41.064867392Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:41.066750 env[1732]: time="2025-05-10T00:50:41.066710328Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:41.068976 env[1732]: time="2025-05-10T00:50:41.068920653Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:41.072928 env[1732]: time="2025-05-10T00:50:41.072889783Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:41.103651 env[1732]: time="2025-05-10T00:50:41.102426684Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:41.103651 env[1732]: time="2025-05-10T00:50:41.102459009Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:41.103651 env[1732]: time="2025-05-10T00:50:41.102469273Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:41.103651 env[1732]: time="2025-05-10T00:50:41.102599757Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/64d2400b72829c277fdc47b74c073d10768d91f5d6f4759a8b42027f75db1069 pid=2259 runtime=io.containerd.runc.v2 May 10 00:50:41.106995 env[1732]: time="2025-05-10T00:50:41.106930252Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:41.106995 env[1732]: time="2025-05-10T00:50:41.106964725Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:41.106995 env[1732]: time="2025-05-10T00:50:41.106975235Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:41.107426 env[1732]: time="2025-05-10T00:50:41.107382439Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/482c6d2c58dd6a39993aa91ca7b13a32cf046059c80112985ab3ade3a0f00f67 pid=2278 runtime=io.containerd.runc.v2 May 10 00:50:41.154426 env[1732]: time="2025-05-10T00:50:41.154381476Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-f7pb6,Uid:24cc23fd-e2e6-48bd-9ec6-546eea0bf00a,Namespace:kube-system,Attempt:0,} returns sandbox id \"482c6d2c58dd6a39993aa91ca7b13a32cf046059c80112985ab3ade3a0f00f67\"" May 10 00:50:41.157059 env[1732]: time="2025-05-10T00:50:41.157021465Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jzsq8,Uid:603f2066-be7b-4650-a9cd-3671e70e40c2,Namespace:calico-system,Attempt:0,} returns sandbox id \"64d2400b72829c277fdc47b74c073d10768d91f5d6f4759a8b42027f75db1069\"" May 10 00:50:41.157951 env[1732]: time="2025-05-10T00:50:41.157831241Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 10 00:50:41.194194 kubelet[2201]: E0510 00:50:41.194129 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:50:42.194771 kubelet[2201]: E0510 00:50:42.194700 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:50:42.211801 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2411121513.mount: Deactivated successfully. May 10 00:50:42.360278 kubelet[2201]: E0510 00:50:42.360223 2201 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p22k7" podUID="7ca0d162-d418-45c7-a797-62fb2e6f50f3" May 10 00:50:42.822828 env[1732]: time="2025-05-10T00:50:42.822762836Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:42.826244 env[1732]: time="2025-05-10T00:50:42.826033884Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:42.828551 env[1732]: time="2025-05-10T00:50:42.828457461Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:42.830035 env[1732]: time="2025-05-10T00:50:42.830001881Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:42.830510 env[1732]: time="2025-05-10T00:50:42.830477905Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b\"" May 10 00:50:42.832225 env[1732]: time="2025-05-10T00:50:42.831796198Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 10 00:50:42.833860 env[1732]: time="2025-05-10T00:50:42.833804899Z" level=info msg="CreateContainer within sandbox \"482c6d2c58dd6a39993aa91ca7b13a32cf046059c80112985ab3ade3a0f00f67\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 10 00:50:42.854951 env[1732]: time="2025-05-10T00:50:42.854904388Z" level=info msg="CreateContainer within sandbox \"482c6d2c58dd6a39993aa91ca7b13a32cf046059c80112985ab3ade3a0f00f67\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"52d61477b1d9692aeb920a18f0e1e48de30e729981440b6cf4d112901115a847\"" May 10 00:50:42.855728 env[1732]: time="2025-05-10T00:50:42.855690226Z" level=info msg="StartContainer for \"52d61477b1d9692aeb920a18f0e1e48de30e729981440b6cf4d112901115a847\"" May 10 00:50:42.923690 env[1732]: time="2025-05-10T00:50:42.918504866Z" level=info msg="StartContainer for \"52d61477b1d9692aeb920a18f0e1e48de30e729981440b6cf4d112901115a847\" returns successfully" May 10 00:50:42.989000 audit[2399]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2399 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:42.992640 kernel: kauditd_printk_skb: 69 callbacks suppressed May 10 00:50:42.992749 kernel: audit: type=1325 audit(1746838242.989:200): table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2399 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:42.989000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2f7d0d60 a2=0 a3=7ffd2f7d0d4c items=0 ppid=2358 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.009966 kernel: audit: type=1300 audit(1746838242.989:200): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2f7d0d60 a2=0 a3=7ffd2f7d0d4c items=0 ppid=2358 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.989000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:50:42.997000 audit[2400]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.018987 kernel: audit: type=1327 audit(1746838242.989:200): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:50:43.019101 kernel: audit: type=1325 audit(1746838242.997:201): table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.019130 kernel: audit: type=1300 audit(1746838242.997:201): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe015c0de0 a2=0 a3=7ffe015c0dcc items=0 ppid=2358 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.997000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe015c0de0 a2=0 a3=7ffe015c0dcc items=0 ppid=2358 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.997000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:50:43.032170 kernel: audit: type=1327 audit(1746838242.997:201): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:50:42.999000 audit[2402]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=2402 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.036322 kernel: audit: type=1325 audit(1746838242.999:202): table=nat:16 family=10 entries=1 op=nft_register_chain pid=2402 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.036461 kernel: audit: type=1300 audit(1746838242.999:202): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8d2ed4b0 a2=0 a3=7ffd8d2ed49c items=0 ppid=2358 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.999000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8d2ed4b0 a2=0 a3=7ffd8d2ed49c items=0 ppid=2358 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.999000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:50:43.048815 kernel: audit: type=1327 audit(1746838242.999:202): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:50:43.048944 kernel: audit: type=1325 audit(1746838243.002:203): table=filter:17 family=10 entries=1 op=nft_register_chain pid=2403 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.002000 audit[2403]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=2403 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.002000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed27242a0 a2=0 a3=7ffed272428c items=0 ppid=2358 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.002000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:50:43.009000 audit[2404]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=2404 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:43.009000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc20c026d0 a2=0 a3=7ffc20c026bc items=0 ppid=2358 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.009000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:50:43.013000 audit[2405]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:43.013000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffccf9f0360 a2=0 a3=7ffccf9f034c items=0 ppid=2358 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.013000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:50:43.091000 audit[2406]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2406 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:43.091000 audit[2406]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc4f458a50 a2=0 a3=7ffc4f458a3c items=0 ppid=2358 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.091000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:50:43.094000 audit[2408]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2408 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:43.094000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc449406d0 a2=0 a3=7ffc449406bc items=0 ppid=2358 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.094000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 10 00:50:43.097000 audit[2411]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2411 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:43.097000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc8f560680 a2=0 a3=7ffc8f56066c items=0 ppid=2358 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.097000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 10 00:50:43.098000 audit[2412]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:43.098000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4d948fa0 a2=0 a3=7ffc4d948f8c items=0 ppid=2358 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.098000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:50:43.101000 audit[2414]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2414 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:43.101000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcf8158a50 a2=0 a3=7ffcf8158a3c items=0 ppid=2358 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.101000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:50:43.102000 audit[2415]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:43.102000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe37c21ef0 a2=0 a3=7ffe37c21edc items=0 ppid=2358 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.102000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:50:43.105000 audit[2417]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:43.105000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff81fb3480 a2=0 a3=7fff81fb346c items=0 ppid=2358 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.105000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:50:43.109000 audit[2420]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:43.109000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff22ccc110 a2=0 a3=7fff22ccc0fc items=0 ppid=2358 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 10 00:50:43.110000 audit[2421]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2421 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:43.110000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4fc90f40 a2=0 a3=7ffe4fc90f2c items=0 ppid=2358 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.110000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:50:43.113000 audit[2423]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:43.113000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd18714410 a2=0 a3=7ffd187143fc items=0 ppid=2358 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:50:43.114000 audit[2424]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2424 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:43.114000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0bce99d0 a2=0 a3=7ffc0bce99bc items=0 ppid=2358 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.114000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:50:43.117000 audit[2426]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2426 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:43.117000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffff260c50 a2=0 a3=7fffff260c3c items=0 ppid=2358 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.117000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:50:43.122000 audit[2429]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:43.122000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff62d3e520 a2=0 a3=7fff62d3e50c items=0 ppid=2358 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.122000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:50:43.126000 audit[2432]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2432 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:43.126000 audit[2432]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd58085990 a2=0 a3=7ffd5808597c items=0 ppid=2358 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.126000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:50:43.128000 audit[2433]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2433 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:43.128000 audit[2433]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd55038ea0 a2=0 a3=7ffd55038e8c items=0 ppid=2358 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.128000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:50:43.131000 audit[2435]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:43.131000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffda925ebd0 a2=0 a3=7ffda925ebbc items=0 ppid=2358 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.131000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:50:43.160000 audit[2440]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2440 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:43.160000 audit[2440]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd85b3a790 a2=0 a3=7ffd85b3a77c items=0 ppid=2358 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.160000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:50:43.161000 audit[2441]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:43.161000 audit[2441]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeea540b80 a2=0 a3=7ffeea540b6c items=0 ppid=2358 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.161000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:50:43.164000 audit[2443]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2443 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:43.164000 audit[2443]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffed97257d0 a2=0 a3=7ffed97257bc items=0 ppid=2358 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.164000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:50:43.190000 audit[2449]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=2449 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:43.190000 audit[2449]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd7258ac40 a2=0 a3=7ffd7258ac2c items=0 ppid=2358 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.190000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:43.195633 kubelet[2201]: E0510 00:50:43.195593 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:50:43.198018 amazon-ssm-agent[1896]: 2025-05-10 00:50:43 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. May 10 00:50:43.213000 audit[2449]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=2449 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:43.213000 audit[2449]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7ffd7258ac40 a2=0 a3=7ffd7258ac2c items=0 ppid=2358 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.213000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:43.215000 audit[2455]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2455 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.215000 audit[2455]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd9fb4da00 a2=0 a3=7ffd9fb4d9ec items=0 ppid=2358 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.215000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:50:43.217000 audit[2457]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2457 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.217000 audit[2457]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc6867cdd0 a2=0 a3=7ffc6867cdbc items=0 ppid=2358 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.217000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 10 00:50:43.222000 audit[2460]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2460 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.222000 audit[2460]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc33354da0 a2=0 a3=7ffc33354d8c items=0 ppid=2358 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.222000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 10 00:50:43.223000 audit[2461]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2461 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.223000 audit[2461]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc98228ff0 a2=0 a3=7ffc98228fdc items=0 ppid=2358 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.223000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:50:43.226000 audit[2463]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2463 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.226000 audit[2463]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe7b64c920 a2=0 a3=7ffe7b64c90c items=0 ppid=2358 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.226000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:50:43.227000 audit[2464]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2464 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.227000 audit[2464]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff370ac510 a2=0 a3=7fff370ac4fc items=0 ppid=2358 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.227000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:50:43.230000 audit[2466]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2466 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.230000 audit[2466]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc8a629f20 a2=0 a3=7ffc8a629f0c items=0 ppid=2358 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 10 00:50:43.234000 audit[2469]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2469 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.234000 audit[2469]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc5f6a2060 a2=0 a3=7ffc5f6a204c items=0 ppid=2358 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.234000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:50:43.236000 audit[2470]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2470 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.236000 audit[2470]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa9d48b80 a2=0 a3=7fffa9d48b6c items=0 ppid=2358 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.236000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:50:43.238000 audit[2472]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2472 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.238000 audit[2472]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffc375bce0 a2=0 a3=7fffc375bccc items=0 ppid=2358 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:50:43.240000 audit[2473]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2473 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.240000 audit[2473]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2669aac0 a2=0 a3=7ffe2669aaac items=0 ppid=2358 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.240000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:50:43.242000 audit[2475]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2475 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.242000 audit[2475]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff41a8b770 a2=0 a3=7fff41a8b75c items=0 ppid=2358 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.242000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:50:43.246000 audit[2478]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2478 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.246000 audit[2478]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd16bd35f0 a2=0 a3=7ffd16bd35dc items=0 ppid=2358 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.246000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:50:43.250000 audit[2481]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2481 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.250000 audit[2481]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd58f92080 a2=0 a3=7ffd58f9206c items=0 ppid=2358 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.250000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 10 00:50:43.251000 audit[2482]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2482 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.251000 audit[2482]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffceade0a80 a2=0 a3=7ffceade0a6c items=0 ppid=2358 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.251000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:50:43.254000 audit[2484]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.254000 audit[2484]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdafdca6c0 a2=0 a3=7ffdafdca6ac items=0 ppid=2358 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.254000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:50:43.264000 audit[2487]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.264000 audit[2487]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe436660c0 a2=0 a3=7ffe436660ac items=0 ppid=2358 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.264000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:50:43.265000 audit[2488]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2488 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.265000 audit[2488]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9b7746a0 a2=0 a3=7ffe9b77468c items=0 ppid=2358 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.265000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:50:43.268000 audit[2490]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.268000 audit[2490]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff50e222f0 a2=0 a3=7fff50e222dc items=0 ppid=2358 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.268000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:50:43.270000 audit[2491]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2491 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.270000 audit[2491]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef755b830 a2=0 a3=7ffef755b81c items=0 ppid=2358 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.270000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:50:43.272000 audit[2493]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2493 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.272000 audit[2493]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd15f39280 a2=0 a3=7ffd15f3926c items=0 ppid=2358 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.272000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:50:43.277000 audit[2496]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2496 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:43.277000 audit[2496]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffef52ae460 a2=0 a3=7ffef52ae44c items=0 ppid=2358 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.277000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:50:43.281000 audit[2498]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2498 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:50:43.281000 audit[2498]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffee1741970 a2=0 a3=7ffee174195c items=0 ppid=2358 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.281000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:43.281000 audit[2498]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2498 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:50:43.281000 audit[2498]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffee1741970 a2=0 a3=7ffee174195c items=0 ppid=2358 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.281000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:43.381142 kubelet[2201]: I0510 00:50:43.380981 2201 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-f7pb6" podStartSLOduration=2.706766212 podStartE2EDuration="4.380966191s" podCreationTimestamp="2025-05-10 00:50:39 +0000 UTC" firstStartedPulling="2025-05-10 00:50:41.157414167 +0000 UTC m=+2.452206940" lastFinishedPulling="2025-05-10 00:50:42.831614137 +0000 UTC m=+4.126406919" observedRunningTime="2025-05-10 00:50:43.380263178 +0000 UTC m=+4.675055967" watchObservedRunningTime="2025-05-10 00:50:43.380966191 +0000 UTC m=+4.675758983" May 10 00:50:43.449624 kubelet[2201]: E0510 00:50:43.449592 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.449624 kubelet[2201]: W0510 00:50:43.449617 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.449798 kubelet[2201]: E0510 00:50:43.449638 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.449868 kubelet[2201]: E0510 00:50:43.449834 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.449868 kubelet[2201]: W0510 00:50:43.449857 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.449924 kubelet[2201]: E0510 00:50:43.449876 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.450095 kubelet[2201]: E0510 00:50:43.450071 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.450095 kubelet[2201]: W0510 00:50:43.450089 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.450219 kubelet[2201]: E0510 00:50:43.450105 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.450314 kubelet[2201]: E0510 00:50:43.450300 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.450314 kubelet[2201]: W0510 00:50:43.450311 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.450384 kubelet[2201]: E0510 00:50:43.450320 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.450528 kubelet[2201]: E0510 00:50:43.450509 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.450528 kubelet[2201]: W0510 00:50:43.450523 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.450614 kubelet[2201]: E0510 00:50:43.450535 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.450818 kubelet[2201]: E0510 00:50:43.450722 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.450818 kubelet[2201]: W0510 00:50:43.450736 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.450818 kubelet[2201]: E0510 00:50:43.450747 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.450974 kubelet[2201]: E0510 00:50:43.450958 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.450974 kubelet[2201]: W0510 00:50:43.450969 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.450974 kubelet[2201]: E0510 00:50:43.450978 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.451197 kubelet[2201]: E0510 00:50:43.451178 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.451248 kubelet[2201]: W0510 00:50:43.451199 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.451248 kubelet[2201]: E0510 00:50:43.451211 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.451433 kubelet[2201]: E0510 00:50:43.451416 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.451433 kubelet[2201]: W0510 00:50:43.451427 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.451527 kubelet[2201]: E0510 00:50:43.451437 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.451606 kubelet[2201]: E0510 00:50:43.451593 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.451606 kubelet[2201]: W0510 00:50:43.451602 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.451681 kubelet[2201]: E0510 00:50:43.451610 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.451751 kubelet[2201]: E0510 00:50:43.451739 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.451751 kubelet[2201]: W0510 00:50:43.451748 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.451813 kubelet[2201]: E0510 00:50:43.451755 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.451945 kubelet[2201]: E0510 00:50:43.451928 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.452002 kubelet[2201]: W0510 00:50:43.451949 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.452002 kubelet[2201]: E0510 00:50:43.451967 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.452204 kubelet[2201]: E0510 00:50:43.452160 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.452204 kubelet[2201]: W0510 00:50:43.452174 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.452204 kubelet[2201]: E0510 00:50:43.452184 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.452346 kubelet[2201]: E0510 00:50:43.452337 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.452346 kubelet[2201]: W0510 00:50:43.452343 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.452405 kubelet[2201]: E0510 00:50:43.452351 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.452690 kubelet[2201]: E0510 00:50:43.452663 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.452690 kubelet[2201]: W0510 00:50:43.452679 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.452770 kubelet[2201]: E0510 00:50:43.452692 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.452930 kubelet[2201]: E0510 00:50:43.452912 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.452930 kubelet[2201]: W0510 00:50:43.452924 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.453023 kubelet[2201]: E0510 00:50:43.452934 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.453144 kubelet[2201]: E0510 00:50:43.453127 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.453144 kubelet[2201]: W0510 00:50:43.453140 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.453225 kubelet[2201]: E0510 00:50:43.453152 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.453361 kubelet[2201]: E0510 00:50:43.453343 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.453361 kubelet[2201]: W0510 00:50:43.453355 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.453449 kubelet[2201]: E0510 00:50:43.453366 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.453565 kubelet[2201]: E0510 00:50:43.453548 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.453565 kubelet[2201]: W0510 00:50:43.453561 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.453654 kubelet[2201]: E0510 00:50:43.453572 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.453778 kubelet[2201]: E0510 00:50:43.453764 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.453778 kubelet[2201]: W0510 00:50:43.453775 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.453880 kubelet[2201]: E0510 00:50:43.453786 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.462206 kubelet[2201]: E0510 00:50:43.462163 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.462206 kubelet[2201]: W0510 00:50:43.462187 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.462206 kubelet[2201]: E0510 00:50:43.462208 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.462535 kubelet[2201]: E0510 00:50:43.462510 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.462535 kubelet[2201]: W0510 00:50:43.462529 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.462689 kubelet[2201]: E0510 00:50:43.462558 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.462811 kubelet[2201]: E0510 00:50:43.462792 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.462811 kubelet[2201]: W0510 00:50:43.462806 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.462952 kubelet[2201]: E0510 00:50:43.462820 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.463017 kubelet[2201]: E0510 00:50:43.463004 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.463017 kubelet[2201]: W0510 00:50:43.463014 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.463076 kubelet[2201]: E0510 00:50:43.463026 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.463189 kubelet[2201]: E0510 00:50:43.463177 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.463189 kubelet[2201]: W0510 00:50:43.463189 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.463265 kubelet[2201]: E0510 00:50:43.463201 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.463371 kubelet[2201]: E0510 00:50:43.463360 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.463371 kubelet[2201]: W0510 00:50:43.463371 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.463431 kubelet[2201]: E0510 00:50:43.463379 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.463672 kubelet[2201]: E0510 00:50:43.463656 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.463672 kubelet[2201]: W0510 00:50:43.463671 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.463753 kubelet[2201]: E0510 00:50:43.463687 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.463883 kubelet[2201]: E0510 00:50:43.463872 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.463883 kubelet[2201]: W0510 00:50:43.463883 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.463942 kubelet[2201]: E0510 00:50:43.463893 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.464055 kubelet[2201]: E0510 00:50:43.464044 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.464055 kubelet[2201]: W0510 00:50:43.464055 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.464118 kubelet[2201]: E0510 00:50:43.464065 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.464299 kubelet[2201]: E0510 00:50:43.464277 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.464299 kubelet[2201]: W0510 00:50:43.464294 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.464389 kubelet[2201]: E0510 00:50:43.464314 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.464725 kubelet[2201]: E0510 00:50:43.464707 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.464725 kubelet[2201]: W0510 00:50:43.464723 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.464809 kubelet[2201]: E0510 00:50:43.464739 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:43.465022 kubelet[2201]: E0510 00:50:43.465003 2201 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:43.465022 kubelet[2201]: W0510 00:50:43.465017 2201 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:43.465106 kubelet[2201]: E0510 00:50:43.465028 2201 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:44.040861 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3818392142.mount: Deactivated successfully. May 10 00:50:44.175676 env[1732]: time="2025-05-10T00:50:44.175625512Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:44.178029 env[1732]: time="2025-05-10T00:50:44.177985260Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:44.179905 env[1732]: time="2025-05-10T00:50:44.179869692Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:44.181862 env[1732]: time="2025-05-10T00:50:44.181815005Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:44.182359 env[1732]: time="2025-05-10T00:50:44.182327400Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 10 00:50:44.184947 env[1732]: time="2025-05-10T00:50:44.184909063Z" level=info msg="CreateContainer within sandbox \"64d2400b72829c277fdc47b74c073d10768d91f5d6f4759a8b42027f75db1069\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 00:50:44.198767 kubelet[2201]: E0510 00:50:44.197942 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:50:44.202712 env[1732]: time="2025-05-10T00:50:44.202660132Z" level=info msg="CreateContainer within sandbox \"64d2400b72829c277fdc47b74c073d10768d91f5d6f4759a8b42027f75db1069\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"4a5871e8adc1d03390db2e8c1895624eb19c979d60ae6fa350f7443fa7c3c65d\"" May 10 00:50:44.203345 env[1732]: time="2025-05-10T00:50:44.203288744Z" level=info msg="StartContainer for \"4a5871e8adc1d03390db2e8c1895624eb19c979d60ae6fa350f7443fa7c3c65d\"" May 10 00:50:44.265789 env[1732]: time="2025-05-10T00:50:44.265732790Z" level=info msg="StartContainer for \"4a5871e8adc1d03390db2e8c1895624eb19c979d60ae6fa350f7443fa7c3c65d\" returns successfully" May 10 00:50:44.360167 kubelet[2201]: E0510 00:50:44.360035 2201 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p22k7" podUID="7ca0d162-d418-45c7-a797-62fb2e6f50f3" May 10 00:50:44.439204 env[1732]: time="2025-05-10T00:50:44.439159305Z" level=info msg="shim disconnected" id=4a5871e8adc1d03390db2e8c1895624eb19c979d60ae6fa350f7443fa7c3c65d May 10 00:50:44.439404 env[1732]: time="2025-05-10T00:50:44.439219016Z" level=warning msg="cleaning up after shim disconnected" id=4a5871e8adc1d03390db2e8c1895624eb19c979d60ae6fa350f7443fa7c3c65d namespace=k8s.io May 10 00:50:44.439404 env[1732]: time="2025-05-10T00:50:44.439240535Z" level=info msg="cleaning up dead shim" May 10 00:50:44.447252 env[1732]: time="2025-05-10T00:50:44.447192304Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:50:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2577 runtime=io.containerd.runc.v2\n" May 10 00:50:44.993259 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4a5871e8adc1d03390db2e8c1895624eb19c979d60ae6fa350f7443fa7c3c65d-rootfs.mount: Deactivated successfully. May 10 00:50:45.198267 kubelet[2201]: E0510 00:50:45.198208 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:50:45.377896 env[1732]: time="2025-05-10T00:50:45.377836665Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 10 00:50:46.170000 audit[2595]: NETFILTER_CFG table=filter:65 family=2 entries=16 op=nft_register_rule pid=2595 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:46.170000 audit[2595]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcefba6910 a2=0 a3=7ffcefba68fc items=0 ppid=2358 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:46.170000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:46.172000 audit[2595]: NETFILTER_CFG table=nat:66 family=2 entries=14 op=nft_register_rule pid=2595 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:46.172000 audit[2595]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffcefba6910 a2=0 a3=0 items=0 ppid=2358 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:46.172000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:46.198759 kubelet[2201]: E0510 00:50:46.198721 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:50:46.360923 kubelet[2201]: E0510 00:50:46.360874 2201 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p22k7" podUID="7ca0d162-d418-45c7-a797-62fb2e6f50f3" May 10 00:50:47.173000 audit[2597]: NETFILTER_CFG table=filter:67 family=2 entries=16 op=nft_register_rule pid=2597 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:47.173000 audit[2597]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff1410f8b0 a2=0 a3=7fff1410f89c items=0 ppid=2358 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.173000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:47.177000 audit[2597]: NETFILTER_CFG table=nat:68 family=2 entries=14 op=nft_register_rule pid=2597 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:47.177000 audit[2597]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff1410f8b0 a2=0 a3=0 items=0 ppid=2358 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.177000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:47.199588 kubelet[2201]: E0510 00:50:47.199515 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:50:47.206000 audit[2599]: NETFILTER_CFG table=filter:69 family=2 entries=13 op=nft_register_rule pid=2599 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:47.206000 audit[2599]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd32056a80 a2=0 a3=7ffd32056a6c items=0 ppid=2358 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.206000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:47.213000 audit[2599]: NETFILTER_CFG table=nat:70 family=2 entries=35 op=nft_register_chain pid=2599 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:47.213000 audit[2599]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd32056a80 a2=0 a3=7ffd32056a6c items=0 ppid=2358 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.213000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:48.200188 kubelet[2201]: E0510 00:50:48.200139 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:50:48.255476 kernel: kauditd_printk_skb: 161 callbacks suppressed May 10 00:50:48.255609 kernel: audit: type=1325 audit(1746838248.245:257): table=filter:71 family=2 entries=10 op=nft_register_rule pid=2604 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:48.245000 audit[2604]: NETFILTER_CFG table=filter:71 family=2 entries=10 op=nft_register_rule pid=2604 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:48.269072 kernel: audit: type=1300 audit(1746838248.245:257): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffce6c94020 a2=0 a3=7ffce6c9400c items=0 ppid=2358 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.245000 audit[2604]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffce6c94020 a2=0 a3=7ffce6c9400c items=0 ppid=2358 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.245000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:48.276991 kernel: audit: type=1327 audit(1746838248.245:257): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:48.280000 audit[2604]: NETFILTER_CFG table=nat:72 family=2 entries=56 op=nft_register_chain pid=2604 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:48.291902 kernel: audit: type=1325 audit(1746838248.280:258): table=nat:72 family=2 entries=56 op=nft_register_chain pid=2604 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:48.280000 audit[2604]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffce6c94020 a2=0 a3=7ffce6c9400c items=0 ppid=2358 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.304871 kernel: audit: type=1300 audit(1746838248.280:258): arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffce6c94020 a2=0 a3=7ffce6c9400c items=0 ppid=2358 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.280000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:48.311903 kernel: audit: type=1327 audit(1746838248.280:258): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:48.360389 kubelet[2201]: E0510 00:50:48.359910 2201 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p22k7" podUID="7ca0d162-d418-45c7-a797-62fb2e6f50f3" May 10 00:50:49.196631 env[1732]: time="2025-05-10T00:50:49.196589274Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:49.199324 env[1732]: time="2025-05-10T00:50:49.199268807Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:49.200948 kubelet[2201]: E0510 00:50:49.200912 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:50:49.201427 env[1732]: time="2025-05-10T00:50:49.201386762Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:49.204353 env[1732]: time="2025-05-10T00:50:49.204001188Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:49.205000 audit[2607]: NETFILTER_CFG table=filter:73 family=2 entries=10 op=nft_register_rule pid=2607 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:49.206378 env[1732]: time="2025-05-10T00:50:49.204651808Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 10 00:50:49.205000 audit[2607]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc1b1e6ef0 a2=0 a3=7ffc1b1e6edc items=0 ppid=2358 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:49.215786 env[1732]: time="2025-05-10T00:50:49.215748400Z" level=info msg="CreateContainer within sandbox \"64d2400b72829c277fdc47b74c073d10768d91f5d6f4759a8b42027f75db1069\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 00:50:49.218486 kernel: audit: type=1325 audit(1746838249.205:259): table=filter:73 family=2 entries=10 op=nft_register_rule pid=2607 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:49.218606 kernel: audit: type=1300 audit(1746838249.205:259): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc1b1e6ef0 a2=0 a3=7ffc1b1e6edc items=0 ppid=2358 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:49.218648 kernel: audit: type=1327 audit(1746838249.205:259): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:49.205000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:49.218000 audit[2607]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=2607 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:49.226523 kernel: audit: type=1325 audit(1746838249.218:260): table=nat:74 family=2 entries=20 op=nft_register_rule pid=2607 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:49.218000 audit[2607]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc1b1e6ef0 a2=0 a3=7ffc1b1e6edc items=0 ppid=2358 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:49.218000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:49.233435 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount984799723.mount: Deactivated successfully. May 10 00:50:49.240803 env[1732]: time="2025-05-10T00:50:49.240755193Z" level=info msg="CreateContainer within sandbox \"64d2400b72829c277fdc47b74c073d10768d91f5d6f4759a8b42027f75db1069\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"0b9da8ce4515355bb4bf751c8846bf18b78e6440dcfc6d43d7ffa7d4fa880094\"" May 10 00:50:49.241430 env[1732]: time="2025-05-10T00:50:49.241400337Z" level=info msg="StartContainer for \"0b9da8ce4515355bb4bf751c8846bf18b78e6440dcfc6d43d7ffa7d4fa880094\"" May 10 00:50:49.272510 systemd[1]: run-containerd-runc-k8s.io-0b9da8ce4515355bb4bf751c8846bf18b78e6440dcfc6d43d7ffa7d4fa880094-runc.jKuE70.mount: Deactivated successfully. May 10 00:50:49.311496 env[1732]: time="2025-05-10T00:50:49.309148370Z" level=info msg="StartContainer for \"0b9da8ce4515355bb4bf751c8846bf18b78e6440dcfc6d43d7ffa7d4fa880094\" returns successfully" May 10 00:50:50.202098 kubelet[2201]: E0510 00:50:50.202051 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:50:50.232000 audit[2645]: NETFILTER_CFG table=filter:75 family=2 entries=10 op=nft_register_rule pid=2645 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:50.232000 audit[2645]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd35c15de0 a2=0 a3=7ffd35c15dcc items=0 ppid=2358 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:50.232000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:50.234000 audit[2645]: NETFILTER_CFG table=nat:76 family=2 entries=20 op=nft_register_rule pid=2645 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:50.234000 audit[2645]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd35c15de0 a2=0 a3=7ffd35c15dcc items=0 ppid=2358 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:50.234000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:50.264048 env[1732]: time="2025-05-10T00:50:50.263992162Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:50:50.274001 kubelet[2201]: I0510 00:50:50.273977 2201 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 10 00:50:50.286232 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0b9da8ce4515355bb4bf751c8846bf18b78e6440dcfc6d43d7ffa7d4fa880094-rootfs.mount: Deactivated successfully. May 10 00:50:50.350195 env[1732]: time="2025-05-10T00:50:50.350146407Z" level=info msg="shim disconnected" id=0b9da8ce4515355bb4bf751c8846bf18b78e6440dcfc6d43d7ffa7d4fa880094 May 10 00:50:50.350195 env[1732]: time="2025-05-10T00:50:50.350191223Z" level=warning msg="cleaning up after shim disconnected" id=0b9da8ce4515355bb4bf751c8846bf18b78e6440dcfc6d43d7ffa7d4fa880094 namespace=k8s.io May 10 00:50:50.350195 env[1732]: time="2025-05-10T00:50:50.350200738Z" level=info msg="cleaning up dead shim" May 10 00:50:50.359094 env[1732]: time="2025-05-10T00:50:50.359047835Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:50:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2659 runtime=io.containerd.runc.v2\n" May 10 00:50:50.363627 env[1732]: time="2025-05-10T00:50:50.363120854Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-p22k7,Uid:7ca0d162-d418-45c7-a797-62fb2e6f50f3,Namespace:calico-system,Attempt:0,}" May 10 00:50:50.400981 env[1732]: time="2025-05-10T00:50:50.400942161Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 10 00:50:50.444795 env[1732]: time="2025-05-10T00:50:50.444718230Z" level=error msg="Failed to destroy network for sandbox \"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:50.448448 env[1732]: time="2025-05-10T00:50:50.448089297Z" level=error msg="encountered an error cleaning up failed sandbox \"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:50.447365 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71-shm.mount: Deactivated successfully. May 10 00:50:50.448767 env[1732]: time="2025-05-10T00:50:50.448175812Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-p22k7,Uid:7ca0d162-d418-45c7-a797-62fb2e6f50f3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:50.448961 kubelet[2201]: E0510 00:50:50.448910 2201 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:50.449077 kubelet[2201]: E0510 00:50:50.448981 2201 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-p22k7" May 10 00:50:50.449077 kubelet[2201]: E0510 00:50:50.449007 2201 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-p22k7" May 10 00:50:50.449167 kubelet[2201]: E0510 00:50:50.449069 2201 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-p22k7_calico-system(7ca0d162-d418-45c7-a797-62fb2e6f50f3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-p22k7_calico-system(7ca0d162-d418-45c7-a797-62fb2e6f50f3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-p22k7" podUID="7ca0d162-d418-45c7-a797-62fb2e6f50f3" May 10 00:50:51.203105 kubelet[2201]: E0510 00:50:51.203038 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:50:51.243000 audit[2704]: NETFILTER_CFG table=filter:77 family=2 entries=10 op=nft_register_rule pid=2704 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:51.243000 audit[2704]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe4ecd7170 a2=0 a3=7ffe4ecd715c items=0 ppid=2358 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:51.243000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:51.247000 audit[2704]: NETFILTER_CFG table=nat:78 family=2 entries=20 op=nft_register_rule pid=2704 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:51.247000 audit[2704]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe4ecd7170 a2=0 a3=7ffe4ecd715c items=0 ppid=2358 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:51.247000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:51.402168 kubelet[2201]: I0510 00:50:51.402137 2201 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" May 10 00:50:51.402974 env[1732]: time="2025-05-10T00:50:51.402913666Z" level=info msg="StopPodSandbox for \"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71\"" May 10 00:50:51.440029 env[1732]: time="2025-05-10T00:50:51.439962886Z" level=error msg="StopPodSandbox for \"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71\" failed" error="failed to destroy network for sandbox \"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:51.440290 kubelet[2201]: E0510 00:50:51.440244 2201 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" May 10 00:50:51.440394 kubelet[2201]: E0510 00:50:51.440308 2201 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71"} May 10 00:50:51.440394 kubelet[2201]: E0510 00:50:51.440377 2201 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7ca0d162-d418-45c7-a797-62fb2e6f50f3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:50:51.440621 kubelet[2201]: E0510 00:50:51.440406 2201 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7ca0d162-d418-45c7-a797-62fb2e6f50f3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-p22k7" podUID="7ca0d162-d418-45c7-a797-62fb2e6f50f3" May 10 00:50:52.204207 kubelet[2201]: E0510 00:50:52.204151 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:50:52.280000 audit[2724]: NETFILTER_CFG table=filter:79 family=2 entries=9 op=nft_register_rule pid=2724 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:52.280000 audit[2724]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffeeca03cf0 a2=0 a3=7ffeeca03cdc items=0 ppid=2358 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:52.280000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:52.285000 audit[2724]: NETFILTER_CFG table=nat:80 family=2 entries=27 op=nft_register_chain pid=2724 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:52.285000 audit[2724]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffeeca03cf0 a2=0 a3=7ffeeca03cdc items=0 ppid=2358 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:52.285000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:52.338756 systemd[1]: systemd-hostnamed.service: Deactivated successfully. May 10 00:50:52.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:53.204865 kubelet[2201]: E0510 00:50:53.204817 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:50:53.978399 kubelet[2201]: I0510 00:50:53.977114 2201 topology_manager.go:215] "Topology Admit Handler" podUID="531d80d8-cda2-4dc6-8483-b0f2133abf81" podNamespace="default" podName="nginx-deployment-85f456d6dd-csqvj" May 10 00:50:54.044311 kubelet[2201]: I0510 00:50:54.044271 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-48pt2\" (UniqueName: \"kubernetes.io/projected/531d80d8-cda2-4dc6-8483-b0f2133abf81-kube-api-access-48pt2\") pod \"nginx-deployment-85f456d6dd-csqvj\" (UID: \"531d80d8-cda2-4dc6-8483-b0f2133abf81\") " pod="default/nginx-deployment-85f456d6dd-csqvj" May 10 00:50:54.205625 kubelet[2201]: E0510 00:50:54.205583 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:50:54.282036 env[1732]: time="2025-05-10T00:50:54.281991697Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-csqvj,Uid:531d80d8-cda2-4dc6-8483-b0f2133abf81,Namespace:default,Attempt:0,}" May 10 00:50:54.621218 env[1732]: time="2025-05-10T00:50:54.620890794Z" level=error msg="Failed to destroy network for sandbox \"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:54.624299 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c-shm.mount: Deactivated successfully. May 10 00:50:54.626003 env[1732]: time="2025-05-10T00:50:54.625948746Z" level=error msg="encountered an error cleaning up failed sandbox \"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:54.626171 env[1732]: time="2025-05-10T00:50:54.626138971Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-csqvj,Uid:531d80d8-cda2-4dc6-8483-b0f2133abf81,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:54.626880 kubelet[2201]: E0510 00:50:54.626487 2201 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:54.626880 kubelet[2201]: E0510 00:50:54.626557 2201 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-csqvj" May 10 00:50:54.626880 kubelet[2201]: E0510 00:50:54.626586 2201 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-csqvj" May 10 00:50:54.627103 kubelet[2201]: E0510 00:50:54.626636 2201 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-csqvj_default(531d80d8-cda2-4dc6-8483-b0f2133abf81)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-csqvj_default(531d80d8-cda2-4dc6-8483-b0f2133abf81)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-csqvj" podUID="531d80d8-cda2-4dc6-8483-b0f2133abf81" May 10 00:50:55.205990 kubelet[2201]: E0510 00:50:55.205924 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:50:55.411558 kubelet[2201]: I0510 00:50:55.411519 2201 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" May 10 00:50:55.412403 env[1732]: time="2025-05-10T00:50:55.412341532Z" level=info msg="StopPodSandbox for \"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c\"" May 10 00:50:55.476646 env[1732]: time="2025-05-10T00:50:55.476191602Z" level=error msg="StopPodSandbox for \"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c\" failed" error="failed to destroy network for sandbox \"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:55.476805 kubelet[2201]: E0510 00:50:55.476471 2201 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" May 10 00:50:55.476805 kubelet[2201]: E0510 00:50:55.476543 2201 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c"} May 10 00:50:55.476805 kubelet[2201]: E0510 00:50:55.476601 2201 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"531d80d8-cda2-4dc6-8483-b0f2133abf81\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:50:55.476805 kubelet[2201]: E0510 00:50:55.476631 2201 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"531d80d8-cda2-4dc6-8483-b0f2133abf81\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-csqvj" podUID="531d80d8-cda2-4dc6-8483-b0f2133abf81" May 10 00:50:56.206081 kubelet[2201]: E0510 00:50:56.206016 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:50:56.291462 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount310694579.mount: Deactivated successfully. May 10 00:50:56.330783 env[1732]: time="2025-05-10T00:50:56.330733858Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:56.336997 env[1732]: time="2025-05-10T00:50:56.336958223Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:56.339791 env[1732]: time="2025-05-10T00:50:56.339752258Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:56.342833 env[1732]: time="2025-05-10T00:50:56.342797865Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:56.343241 env[1732]: time="2025-05-10T00:50:56.343211305Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 10 00:50:56.358431 env[1732]: time="2025-05-10T00:50:56.358387766Z" level=info msg="CreateContainer within sandbox \"64d2400b72829c277fdc47b74c073d10768d91f5d6f4759a8b42027f75db1069\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 00:50:56.383558 env[1732]: time="2025-05-10T00:50:56.383496744Z" level=info msg="CreateContainer within sandbox \"64d2400b72829c277fdc47b74c073d10768d91f5d6f4759a8b42027f75db1069\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65\"" May 10 00:50:56.384147 env[1732]: time="2025-05-10T00:50:56.384125149Z" level=info msg="StartContainer for \"29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65\"" May 10 00:50:56.447641 env[1732]: time="2025-05-10T00:50:56.445558308Z" level=info msg="StartContainer for \"29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65\" returns successfully" May 10 00:50:56.541805 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 10 00:50:56.541978 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 10 00:50:57.099000 audit[2850]: NETFILTER_CFG table=filter:81 family=2 entries=8 op=nft_register_rule pid=2850 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:57.102929 kernel: kauditd_printk_skb: 21 callbacks suppressed May 10 00:50:57.103054 kernel: audit: type=1325 audit(1746838257.099:268): table=filter:81 family=2 entries=8 op=nft_register_rule pid=2850 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:57.099000 audit[2850]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffde3d68c40 a2=0 a3=7ffde3d68c2c items=0 ppid=2358 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:57.114132 kernel: audit: type=1300 audit(1746838257.099:268): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffde3d68c40 a2=0 a3=7ffde3d68c2c items=0 ppid=2358 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:57.114267 kernel: audit: type=1327 audit(1746838257.099:268): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:57.099000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:57.119000 audit[2850]: NETFILTER_CFG table=nat:82 family=2 entries=34 op=nft_register_chain pid=2850 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:57.119000 audit[2850]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffde3d68c40 a2=0 a3=7ffde3d68c2c items=0 ppid=2358 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:57.132372 kernel: audit: type=1325 audit(1746838257.119:269): table=nat:82 family=2 entries=34 op=nft_register_chain pid=2850 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:57.132635 kernel: audit: type=1300 audit(1746838257.119:269): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffde3d68c40 a2=0 a3=7ffde3d68c2c items=0 ppid=2358 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:57.132678 kernel: audit: type=1327 audit(1746838257.119:269): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:57.119000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:57.160000 audit[2852]: NETFILTER_CFG table=filter:83 family=2 entries=8 op=nft_register_rule pid=2852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:57.160000 audit[2852]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff5a6dcff0 a2=0 a3=7fff5a6dcfdc items=0 ppid=2358 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:57.174325 kernel: audit: type=1325 audit(1746838257.160:270): table=filter:83 family=2 entries=8 op=nft_register_rule pid=2852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:57.174446 kernel: audit: type=1300 audit(1746838257.160:270): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff5a6dcff0 a2=0 a3=7fff5a6dcfdc items=0 ppid=2358 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:57.174476 kernel: audit: type=1327 audit(1746838257.160:270): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:57.160000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:57.178280 kernel: audit: type=1325 audit(1746838257.173:271): table=nat:84 family=2 entries=36 op=nft_register_rule pid=2852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:57.173000 audit[2852]: NETFILTER_CFG table=nat:84 family=2 entries=36 op=nft_register_rule pid=2852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:57.173000 audit[2852]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff5a6dcff0 a2=0 a3=7fff5a6dcfdc items=0 ppid=2358 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:57.173000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:57.206739 kubelet[2201]: E0510 00:50:57.206684 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:50:57.209312 kubelet[2201]: I0510 00:50:57.209278 2201 topology_manager.go:215] "Topology Admit Handler" podUID="8f3cc550-d528-4d22-b4cb-0d6823fa9f78" podNamespace="calico-apiserver" podName="calico-apiserver-7b9fb45589-c4vgk" May 10 00:50:57.275337 kubelet[2201]: I0510 00:50:57.275293 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/8f3cc550-d528-4d22-b4cb-0d6823fa9f78-calico-apiserver-certs\") pod \"calico-apiserver-7b9fb45589-c4vgk\" (UID: \"8f3cc550-d528-4d22-b4cb-0d6823fa9f78\") " pod="calico-apiserver/calico-apiserver-7b9fb45589-c4vgk" May 10 00:50:57.275337 kubelet[2201]: I0510 00:50:57.275340 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7r222\" (UniqueName: \"kubernetes.io/projected/8f3cc550-d528-4d22-b4cb-0d6823fa9f78-kube-api-access-7r222\") pod \"calico-apiserver-7b9fb45589-c4vgk\" (UID: \"8f3cc550-d528-4d22-b4cb-0d6823fa9f78\") " pod="calico-apiserver/calico-apiserver-7b9fb45589-c4vgk" May 10 00:50:57.468813 kubelet[2201]: I0510 00:50:57.468685 2201 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-jzsq8" podStartSLOduration=3.283075518 podStartE2EDuration="18.468666235s" podCreationTimestamp="2025-05-10 00:50:39 +0000 UTC" firstStartedPulling="2025-05-10 00:50:41.158527926 +0000 UTC m=+2.453320698" lastFinishedPulling="2025-05-10 00:50:56.344118642 +0000 UTC m=+17.638911415" observedRunningTime="2025-05-10 00:50:57.464897025 +0000 UTC m=+18.759689809" watchObservedRunningTime="2025-05-10 00:50:57.468666235 +0000 UTC m=+18.763459009" May 10 00:50:57.512711 env[1732]: time="2025-05-10T00:50:57.512657256Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7b9fb45589-c4vgk,Uid:8f3cc550-d528-4d22-b4cb-0d6823fa9f78,Namespace:calico-apiserver,Attempt:0,}" May 10 00:50:57.985000 audit[2910]: AVC avc: denied { write } for pid=2910 comm="tee" name="fd" dev="proc" ino=20734 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:50:57.985000 audit[2910]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc435c1a1d a2=241 a3=1b6 items=1 ppid=2881 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:57.985000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 00:50:57.985000 audit: PATH item=0 name="/dev/fd/63" inode=20712 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:57.985000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:50:57.995000 audit[2923]: AVC avc: denied { write } for pid=2923 comm="tee" name="fd" dev="proc" ino=20082 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:50:57.998000 audit[2919]: AVC avc: denied { write } for pid=2919 comm="tee" name="fd" dev="proc" ino=20741 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:50:57.995000 audit[2923]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcb3fa1a1e a2=241 a3=1b6 items=1 ppid=2880 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:57.995000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 00:50:57.995000 audit: PATH item=0 name="/dev/fd/63" inode=20079 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:57.995000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:50:57.998000 audit[2919]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeedfc2a1f a2=241 a3=1b6 items=1 ppid=2895 pid=2919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:57.998000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 00:50:57.998000 audit: PATH item=0 name="/dev/fd/63" inode=20725 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:57.998000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:50:58.024000 audit[2925]: AVC avc: denied { write } for pid=2925 comm="tee" name="fd" dev="proc" ino=20092 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:50:58.025000 audit[2915]: AVC avc: denied { write } for pid=2915 comm="tee" name="fd" dev="proc" ino=20093 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:50:58.025000 audit[2915]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe95308a1d a2=241 a3=1b6 items=1 ppid=2885 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.025000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 00:50:58.025000 audit: PATH item=0 name="/dev/fd/63" inode=20074 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:58.025000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:50:58.024000 audit[2925]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd5561fa0e a2=241 a3=1b6 items=1 ppid=2886 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.027000 audit[2928]: AVC avc: denied { write } for pid=2928 comm="tee" name="fd" dev="proc" ino=20755 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:50:58.024000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 00:50:58.024000 audit: PATH item=0 name="/dev/fd/63" inode=20736 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:58.024000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:50:58.027000 audit[2928]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeb9362a0d a2=241 a3=1b6 items=1 ppid=2883 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.027000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 00:50:58.027000 audit: PATH item=0 name="/dev/fd/63" inode=20744 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:58.027000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:50:58.058000 audit[2951]: AVC avc: denied { write } for pid=2951 comm="tee" name="fd" dev="proc" ino=20765 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:50:58.058000 audit[2951]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff8b750a1d a2=241 a3=1b6 items=1 ppid=2899 pid=2951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.058000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 00:50:58.058000 audit: PATH item=0 name="/dev/fd/63" inode=20759 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:58.058000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:50:58.169000 audit[2960]: NETFILTER_CFG table=filter:85 family=2 entries=8 op=nft_register_rule pid=2960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:58.169000 audit[2960]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc448bb130 a2=0 a3=7ffc448bb11c items=0 ppid=2358 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.169000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:58.176000 audit[2960]: NETFILTER_CFG table=nat:86 family=2 entries=36 op=nft_register_rule pid=2960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:58.176000 audit[2960]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffc448bb130 a2=0 a3=7ffc448bb11c items=0 ppid=2358 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.176000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:58.207643 kubelet[2201]: E0510 00:50:58.207578 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:50:58.240000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.240000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.240000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.240000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.240000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.240000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.240000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.240000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.240000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.240000 audit: BPF prog-id=10 op=LOAD May 10 00:50:58.240000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff1c398020 a2=98 a3=3 items=0 ppid=2902 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.240000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:58.242000 audit: BPF prog-id=10 op=UNLOAD May 10 00:50:58.242000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.242000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.242000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.242000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.242000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.242000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.242000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.242000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.242000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.242000 audit: BPF prog-id=11 op=LOAD May 10 00:50:58.242000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff1c397e00 a2=74 a3=540051 items=0 ppid=2902 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.242000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:58.242000 audit: BPF prog-id=11 op=UNLOAD May 10 00:50:58.242000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.242000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.242000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.242000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.242000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.242000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.242000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.242000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.242000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.242000 audit: BPF prog-id=12 op=LOAD May 10 00:50:58.242000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff1c397e30 a2=94 a3=2 items=0 ppid=2902 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.242000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:58.242000 audit: BPF prog-id=12 op=UNLOAD May 10 00:50:58.370109 systemd[1]: run-containerd-runc-k8s.io-29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65-runc.aXG3X7.mount: Deactivated successfully. May 10 00:50:58.407318 (udev-worker)[2825]: Network interface NamePolicy= disabled on kernel command line. May 10 00:50:58.409916 systemd-networkd[1413]: cali110ed0b2fb7: Link UP May 10 00:50:58.430702 kubelet[2201]: I0510 00:50:58.429613 2201 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:50:58.439411 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:50:58.439549 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali110ed0b2fb7: link becomes ready May 10 00:50:58.439684 systemd-networkd[1413]: cali110ed0b2fb7: Gained carrier May 10 00:50:58.468905 env[1732]: 2025-05-10 00:50:57.567 [INFO][2856] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 10 00:50:58.468905 env[1732]: 2025-05-10 00:50:57.822 [INFO][2856] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.34-k8s-calico--apiserver--7b9fb45589--c4vgk-eth0 calico-apiserver-7b9fb45589- calico-apiserver 8f3cc550-d528-4d22-b4cb-0d6823fa9f78 1030 0 2025-05-10 00:50:57 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7b9fb45589 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 172.31.22.34 calico-apiserver-7b9fb45589-c4vgk eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali110ed0b2fb7 [] []}} ContainerID="60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42" Namespace="calico-apiserver" Pod="calico-apiserver-7b9fb45589-c4vgk" WorkloadEndpoint="172.31.22.34-k8s-calico--apiserver--7b9fb45589--c4vgk-" May 10 00:50:58.468905 env[1732]: 2025-05-10 00:50:57.830 [INFO][2856] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42" Namespace="calico-apiserver" Pod="calico-apiserver-7b9fb45589-c4vgk" WorkloadEndpoint="172.31.22.34-k8s-calico--apiserver--7b9fb45589--c4vgk-eth0" May 10 00:50:58.468905 env[1732]: 2025-05-10 00:50:58.286 [INFO][2868] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42" HandleID="k8s-pod-network.60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42" Workload="172.31.22.34-k8s-calico--apiserver--7b9fb45589--c4vgk-eth0" May 10 00:50:58.468905 env[1732]: 2025-05-10 00:50:58.302 [INFO][2868] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42" HandleID="k8s-pod-network.60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42" Workload="172.31.22.34-k8s-calico--apiserver--7b9fb45589--c4vgk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00038a5e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"172.31.22.34", "pod":"calico-apiserver-7b9fb45589-c4vgk", "timestamp":"2025-05-10 00:50:58.2861583 +0000 UTC"}, Hostname:"172.31.22.34", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:50:58.468905 env[1732]: 2025-05-10 00:50:58.302 [INFO][2868] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:58.468905 env[1732]: 2025-05-10 00:50:58.302 [INFO][2868] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:58.468905 env[1732]: 2025-05-10 00:50:58.302 [INFO][2868] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.34' May 10 00:50:58.468905 env[1732]: 2025-05-10 00:50:58.306 [INFO][2868] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42" host="172.31.22.34" May 10 00:50:58.468905 env[1732]: 2025-05-10 00:50:58.330 [INFO][2868] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.22.34" May 10 00:50:58.468905 env[1732]: 2025-05-10 00:50:58.341 [INFO][2868] ipam/ipam.go 489: Trying affinity for 192.168.113.64/26 host="172.31.22.34" May 10 00:50:58.468905 env[1732]: 2025-05-10 00:50:58.344 [INFO][2868] ipam/ipam.go 155: Attempting to load block cidr=192.168.113.64/26 host="172.31.22.34" May 10 00:50:58.468905 env[1732]: 2025-05-10 00:50:58.346 [INFO][2868] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="172.31.22.34" May 10 00:50:58.468905 env[1732]: 2025-05-10 00:50:58.346 [INFO][2868] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42" host="172.31.22.34" May 10 00:50:58.468905 env[1732]: 2025-05-10 00:50:58.349 [INFO][2868] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42 May 10 00:50:58.468905 env[1732]: 2025-05-10 00:50:58.363 [INFO][2868] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42" host="172.31.22.34" May 10 00:50:58.468905 env[1732]: 2025-05-10 00:50:58.372 [INFO][2868] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.113.65/26] block=192.168.113.64/26 handle="k8s-pod-network.60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42" host="172.31.22.34" May 10 00:50:58.468905 env[1732]: 2025-05-10 00:50:58.372 [INFO][2868] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.65/26] handle="k8s-pod-network.60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42" host="172.31.22.34" May 10 00:50:58.468905 env[1732]: 2025-05-10 00:50:58.372 [INFO][2868] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:58.468905 env[1732]: 2025-05-10 00:50:58.372 [INFO][2868] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.65/26] IPv6=[] ContainerID="60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42" HandleID="k8s-pod-network.60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42" Workload="172.31.22.34-k8s-calico--apiserver--7b9fb45589--c4vgk-eth0" May 10 00:50:58.470047 env[1732]: 2025-05-10 00:50:58.375 [INFO][2856] cni-plugin/k8s.go 386: Populated endpoint ContainerID="60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42" Namespace="calico-apiserver" Pod="calico-apiserver-7b9fb45589-c4vgk" WorkloadEndpoint="172.31.22.34-k8s-calico--apiserver--7b9fb45589--c4vgk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.34-k8s-calico--apiserver--7b9fb45589--c4vgk-eth0", GenerateName:"calico-apiserver-7b9fb45589-", Namespace:"calico-apiserver", SelfLink:"", UID:"8f3cc550-d528-4d22-b4cb-0d6823fa9f78", ResourceVersion:"1030", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7b9fb45589", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.34", ContainerID:"", Pod:"calico-apiserver-7b9fb45589-c4vgk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali110ed0b2fb7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:58.470047 env[1732]: 2025-05-10 00:50:58.376 [INFO][2856] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.113.65/32] ContainerID="60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42" Namespace="calico-apiserver" Pod="calico-apiserver-7b9fb45589-c4vgk" WorkloadEndpoint="172.31.22.34-k8s-calico--apiserver--7b9fb45589--c4vgk-eth0" May 10 00:50:58.470047 env[1732]: 2025-05-10 00:50:58.376 [INFO][2856] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali110ed0b2fb7 ContainerID="60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42" Namespace="calico-apiserver" Pod="calico-apiserver-7b9fb45589-c4vgk" WorkloadEndpoint="172.31.22.34-k8s-calico--apiserver--7b9fb45589--c4vgk-eth0" May 10 00:50:58.470047 env[1732]: 2025-05-10 00:50:58.440 [INFO][2856] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42" Namespace="calico-apiserver" Pod="calico-apiserver-7b9fb45589-c4vgk" WorkloadEndpoint="172.31.22.34-k8s-calico--apiserver--7b9fb45589--c4vgk-eth0" May 10 00:50:58.470047 env[1732]: 2025-05-10 00:50:58.440 [INFO][2856] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42" Namespace="calico-apiserver" Pod="calico-apiserver-7b9fb45589-c4vgk" WorkloadEndpoint="172.31.22.34-k8s-calico--apiserver--7b9fb45589--c4vgk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.34-k8s-calico--apiserver--7b9fb45589--c4vgk-eth0", GenerateName:"calico-apiserver-7b9fb45589-", Namespace:"calico-apiserver", SelfLink:"", UID:"8f3cc550-d528-4d22-b4cb-0d6823fa9f78", ResourceVersion:"1030", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7b9fb45589", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.34", ContainerID:"60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42", Pod:"calico-apiserver-7b9fb45589-c4vgk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.113.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali110ed0b2fb7", MAC:"de:ae:54:03:43:d1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:58.470047 env[1732]: 2025-05-10 00:50:58.459 [INFO][2856] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42" Namespace="calico-apiserver" Pod="calico-apiserver-7b9fb45589-c4vgk" WorkloadEndpoint="172.31.22.34-k8s-calico--apiserver--7b9fb45589--c4vgk-eth0" May 10 00:50:58.479000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.479000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.479000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.479000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.479000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.479000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.479000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.479000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.479000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.479000 audit: BPF prog-id=13 op=LOAD May 10 00:50:58.479000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff1c397cf0 a2=40 a3=1 items=0 ppid=2902 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.479000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:58.480000 audit: BPF prog-id=13 op=UNLOAD May 10 00:50:58.480000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.480000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff1c397dc0 a2=50 a3=7fff1c397ea0 items=0 ppid=2902 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.480000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:58.496000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.496000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1c397d00 a2=28 a3=0 items=0 ppid=2902 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.496000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:58.496000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.496000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1c397d30 a2=28 a3=0 items=0 ppid=2902 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.496000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:58.496000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.496000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1c397c40 a2=28 a3=0 items=0 ppid=2902 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.496000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:58.496000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.496000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1c397d50 a2=28 a3=0 items=0 ppid=2902 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.496000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:58.496000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.496000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1c397d30 a2=28 a3=0 items=0 ppid=2902 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.496000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:58.496000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.496000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1c397d20 a2=28 a3=0 items=0 ppid=2902 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.496000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:58.496000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.496000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1c397d50 a2=28 a3=0 items=0 ppid=2902 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.496000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:58.496000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.496000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1c397d30 a2=28 a3=0 items=0 ppid=2902 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.496000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:58.496000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.496000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1c397d50 a2=28 a3=0 items=0 ppid=2902 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.496000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:58.496000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.496000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1c397d20 a2=28 a3=0 items=0 ppid=2902 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.496000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:58.496000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.496000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1c397d90 a2=28 a3=0 items=0 ppid=2902 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.496000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:58.497000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.497000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff1c397b40 a2=50 a3=1 items=0 ppid=2902 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.497000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:58.497000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.497000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.497000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.497000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.497000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.497000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.497000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.497000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.497000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.497000 audit: BPF prog-id=14 op=LOAD May 10 00:50:58.497000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff1c397b40 a2=94 a3=5 items=0 ppid=2902 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.497000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:58.497000 audit: BPF prog-id=14 op=UNLOAD May 10 00:50:58.497000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.497000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff1c397bf0 a2=50 a3=1 items=0 ppid=2902 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.497000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:58.499000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.499000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff1c397d10 a2=4 a3=38 items=0 ppid=2902 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.499000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:58.500000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { confidentiality } for pid=2978 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:50:58.500000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff1c397d60 a2=94 a3=6 items=0 ppid=2902 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.500000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:58.500000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { confidentiality } for pid=2978 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:50:58.500000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff1c397510 a2=94 a3=83 items=0 ppid=2902 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.500000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:58.500000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.500000 audit[2978]: AVC avc: denied { confidentiality } for pid=2978 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:50:58.500000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff1c397510 a2=94 a3=83 items=0 ppid=2902 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.500000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:58.514000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit: BPF prog-id=15 op=LOAD May 10 00:50:58.514000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff85a91400 a2=98 a3=1999999999999999 items=0 ppid=2902 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.514000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:50:58.514000 audit: BPF prog-id=15 op=UNLOAD May 10 00:50:58.514000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit: BPF prog-id=16 op=LOAD May 10 00:50:58.514000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff85a912e0 a2=74 a3=ffff items=0 ppid=2902 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.514000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:50:58.514000 audit: BPF prog-id=16 op=UNLOAD May 10 00:50:58.514000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.514000 audit: BPF prog-id=17 op=LOAD May 10 00:50:58.514000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff85a91320 a2=40 a3=7fff85a91500 items=0 ppid=2902 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.514000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:50:58.514000 audit: BPF prog-id=17 op=UNLOAD May 10 00:50:58.536829 env[1732]: time="2025-05-10T00:50:58.536731723Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:58.537679 env[1732]: time="2025-05-10T00:50:58.537641673Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:58.538016 env[1732]: time="2025-05-10T00:50:58.537985571Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:58.538554 env[1732]: time="2025-05-10T00:50:58.538496637Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42 pid=3059 runtime=io.containerd.runc.v2 May 10 00:50:58.613749 systemd-networkd[1413]: vxlan.calico: Link UP May 10 00:50:58.613776 systemd-networkd[1413]: vxlan.calico: Gained carrier May 10 00:50:58.637000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.637000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.637000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.637000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.637000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.637000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.637000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.637000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.637000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.637000 audit: BPF prog-id=18 op=LOAD May 10 00:50:58.637000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffda3d40390 a2=98 a3=ffffffff items=0 ppid=2902 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.637000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:58.637000 audit: BPF prog-id=18 op=UNLOAD May 10 00:50:58.637000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.637000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.637000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.637000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.637000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.637000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.637000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.637000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.637000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.637000 audit: BPF prog-id=19 op=LOAD May 10 00:50:58.637000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffda3d401a0 a2=74 a3=540051 items=0 ppid=2902 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.637000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:58.638000 audit: BPF prog-id=19 op=UNLOAD May 10 00:50:58.638000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit: BPF prog-id=20 op=LOAD May 10 00:50:58.638000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffda3d401d0 a2=94 a3=2 items=0 ppid=2902 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:58.638000 audit: BPF prog-id=20 op=UNLOAD May 10 00:50:58.638000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffda3d400a0 a2=28 a3=0 items=0 ppid=2902 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda3d400d0 a2=28 a3=0 items=0 ppid=2902 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda3d3ffe0 a2=28 a3=0 items=0 ppid=2902 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffda3d400f0 a2=28 a3=0 items=0 ppid=2902 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffda3d400d0 a2=28 a3=0 items=0 ppid=2902 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffda3d400c0 a2=28 a3=0 items=0 ppid=2902 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffda3d400f0 a2=28 a3=0 items=0 ppid=2902 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda3d400d0 a2=28 a3=0 items=0 ppid=2902 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda3d400f0 a2=28 a3=0 items=0 ppid=2902 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffda3d400c0 a2=28 a3=0 items=0 ppid=2902 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffda3d40130 a2=28 a3=0 items=0 ppid=2902 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.638000 audit: BPF prog-id=21 op=LOAD May 10 00:50:58.638000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffda3d3ffa0 a2=40 a3=0 items=0 ppid=2902 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.638000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:58.638000 audit: BPF prog-id=21 op=UNLOAD May 10 00:50:58.639000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.639000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffda3d3ff90 a2=50 a3=2800 items=0 ppid=2902 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.639000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:58.639000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.639000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffda3d3ff90 a2=50 a3=2800 items=0 ppid=2902 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.639000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:58.639000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.639000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.639000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.639000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.639000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.639000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.639000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.639000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.639000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.639000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.639000 audit: BPF prog-id=22 op=LOAD May 10 00:50:58.639000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffda3d3f7b0 a2=94 a3=2 items=0 ppid=2902 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.639000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:58.639000 audit: BPF prog-id=22 op=UNLOAD May 10 00:50:58.639000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.639000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.639000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.639000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.639000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.639000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.639000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.639000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.639000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.639000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.639000 audit: BPF prog-id=23 op=LOAD May 10 00:50:58.639000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffda3d3f8b0 a2=94 a3=30 items=0 ppid=2902 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.639000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:58.643000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.643000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.643000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.643000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.643000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.643000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.643000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.643000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.643000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.643000 audit: BPF prog-id=24 op=LOAD May 10 00:50:58.643000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcc5aa3f90 a2=98 a3=0 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.643000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.647000 audit: BPF prog-id=24 op=UNLOAD May 10 00:50:58.647000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.647000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.647000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.647000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.647000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.647000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.647000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.647000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.647000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.647000 audit: BPF prog-id=25 op=LOAD May 10 00:50:58.647000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcc5aa3d70 a2=74 a3=540051 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.647000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.647000 audit: BPF prog-id=25 op=UNLOAD May 10 00:50:58.647000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.647000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.647000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.647000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.647000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.647000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.647000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.647000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.647000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.647000 audit: BPF prog-id=26 op=LOAD May 10 00:50:58.647000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcc5aa3da0 a2=94 a3=2 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.647000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.647000 audit: BPF prog-id=26 op=UNLOAD May 10 00:50:58.674227 (udev-worker)[3020]: Network interface NamePolicy= disabled on kernel command line. May 10 00:50:58.676116 (udev-worker)[3112]: Network interface NamePolicy= disabled on kernel command line. May 10 00:50:58.739764 env[1732]: time="2025-05-10T00:50:58.739715938Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7b9fb45589-c4vgk,Uid:8f3cc550-d528-4d22-b4cb-0d6823fa9f78,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42\"" May 10 00:50:58.741913 env[1732]: time="2025-05-10T00:50:58.741881968Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:50:58.810000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.810000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.810000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.810000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.810000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.810000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.810000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.810000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.810000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.810000 audit: BPF prog-id=27 op=LOAD May 10 00:50:58.810000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcc5aa3c60 a2=40 a3=1 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.810000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.811000 audit: BPF prog-id=27 op=UNLOAD May 10 00:50:58.811000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.811000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcc5aa3d30 a2=50 a3=7ffcc5aa3e10 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.811000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.824000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.824000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc5aa3c70 a2=28 a3=0 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.824000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.824000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.824000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc5aa3ca0 a2=28 a3=0 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.824000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.824000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.824000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc5aa3bb0 a2=28 a3=0 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.824000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.824000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.824000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc5aa3cc0 a2=28 a3=0 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.824000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.824000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.824000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc5aa3ca0 a2=28 a3=0 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.824000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.824000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.824000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc5aa3c90 a2=28 a3=0 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.824000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.824000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.824000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc5aa3cc0 a2=28 a3=0 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.824000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.824000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.824000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc5aa3ca0 a2=28 a3=0 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.824000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.824000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.824000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc5aa3cc0 a2=28 a3=0 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.824000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.824000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.824000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc5aa3c90 a2=28 a3=0 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.824000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.824000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.824000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc5aa3d00 a2=28 a3=0 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.824000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcc5aa3ab0 a2=50 a3=1 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.825000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit: BPF prog-id=28 op=LOAD May 10 00:50:58.825000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcc5aa3ab0 a2=94 a3=5 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.825000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.825000 audit: BPF prog-id=28 op=UNLOAD May 10 00:50:58.825000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcc5aa3b60 a2=50 a3=1 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.825000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcc5aa3c80 a2=4 a3=38 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.825000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { confidentiality } for pid=3116 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:50:58.825000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcc5aa3cd0 a2=94 a3=6 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.825000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.825000 audit[3116]: AVC avc: denied { confidentiality } for pid=3116 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:50:58.825000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcc5aa3480 a2=94 a3=83 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.825000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.826000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.826000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.826000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.826000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.826000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.826000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.826000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.826000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.826000 audit[3116]: AVC avc: denied { perfmon } for pid=3116 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.826000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.826000 audit[3116]: AVC avc: denied { confidentiality } for pid=3116 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:50:58.826000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcc5aa3480 a2=94 a3=83 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.826000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.826000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.826000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcc5aa4ec0 a2=10 a3=f1f00800 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.826000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.826000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.826000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcc5aa4d60 a2=10 a3=3 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.826000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.826000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.826000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcc5aa4d00 a2=10 a3=3 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.826000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.826000 audit[3116]: AVC avc: denied { bpf } for pid=3116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:58.826000 audit[3116]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcc5aa4d00 a2=10 a3=7 items=0 ppid=2902 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.826000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:58.831000 audit: BPF prog-id=23 op=UNLOAD May 10 00:50:58.906000 audit[3148]: NETFILTER_CFG table=mangle:87 family=2 entries=16 op=nft_register_chain pid=3148 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:58.906000 audit[3148]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffee9b3e010 a2=0 a3=7ffee9b3dffc items=0 ppid=2902 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.906000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:58.917000 audit[3147]: NETFILTER_CFG table=nat:88 family=2 entries=15 op=nft_register_chain pid=3147 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:58.917000 audit[3147]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe72024230 a2=0 a3=7ffe7202421c items=0 ppid=2902 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.917000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:58.920000 audit[3149]: NETFILTER_CFG table=filter:89 family=2 entries=75 op=nft_register_chain pid=3149 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:58.920000 audit[3149]: SYSCALL arch=c000003e syscall=46 success=yes exit=40748 a0=3 a1=7ffcb3d013d0 a2=0 a3=7ffcb3d013bc items=0 ppid=2902 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.920000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:58.922000 audit[3146]: NETFILTER_CFG table=raw:90 family=2 entries=21 op=nft_register_chain pid=3146 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:58.922000 audit[3146]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffcb82a0fb0 a2=0 a3=7ffcb82a0f9c items=0 ppid=2902 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.922000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:59.192609 kubelet[2201]: E0510 00:50:59.192475 2201 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:50:59.207993 kubelet[2201]: E0510 00:50:59.207955 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:50:59.360309 systemd[1]: run-containerd-runc-k8s.io-29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65-runc.kPxgGX.mount: Deactivated successfully. May 10 00:50:59.808963 systemd-networkd[1413]: cali110ed0b2fb7: Gained IPv6LL May 10 00:51:00.209037 kubelet[2201]: E0510 00:51:00.208923 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:00.256777 systemd-networkd[1413]: vxlan.calico: Gained IPv6LL May 10 00:51:01.114830 env[1732]: time="2025-05-10T00:51:01.114778987Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:01.116943 env[1732]: time="2025-05-10T00:51:01.116902442Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:01.118835 env[1732]: time="2025-05-10T00:51:01.118801588Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:01.120421 env[1732]: time="2025-05-10T00:51:01.120387512Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:01.121058 env[1732]: time="2025-05-10T00:51:01.121032323Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:51:01.123017 env[1732]: time="2025-05-10T00:51:01.122981847Z" level=info msg="CreateContainer within sandbox \"60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:51:01.136035 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount459946282.mount: Deactivated successfully. May 10 00:51:01.142599 env[1732]: time="2025-05-10T00:51:01.142555527Z" level=info msg="CreateContainer within sandbox \"60b700919cab6b0975cf0fa2f5ad67e463e2b96fdf95472a005f71278d9e5d42\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"b9ace4c2536224343b8d66d30c0b4d030a8791f17a925960f3e2d452ef9f7179\"" May 10 00:51:01.143332 env[1732]: time="2025-05-10T00:51:01.143309166Z" level=info msg="StartContainer for \"b9ace4c2536224343b8d66d30c0b4d030a8791f17a925960f3e2d452ef9f7179\"" May 10 00:51:01.210258 kubelet[2201]: E0510 00:51:01.209134 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:01.226030 env[1732]: time="2025-05-10T00:51:01.224893419Z" level=info msg="StartContainer for \"b9ace4c2536224343b8d66d30c0b4d030a8791f17a925960f3e2d452ef9f7179\" returns successfully" May 10 00:51:01.472000 audit[3221]: NETFILTER_CFG table=filter:91 family=2 entries=8 op=nft_register_rule pid=3221 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:01.472000 audit[3221]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe119077a0 a2=0 a3=7ffe1190778c items=0 ppid=2358 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:01.472000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:01.478000 audit[3221]: NETFILTER_CFG table=nat:92 family=2 entries=36 op=nft_register_rule pid=3221 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:01.478000 audit[3221]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffe119077a0 a2=0 a3=7ffe1190778c items=0 ppid=2358 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:01.478000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:02.209501 kubelet[2201]: E0510 00:51:02.209465 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:02.439475 kubelet[2201]: I0510 00:51:02.439447 2201 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:51:03.210386 kubelet[2201]: E0510 00:51:03.210349 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:04.211056 kubelet[2201]: E0510 00:51:04.211010 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:04.360340 env[1732]: time="2025-05-10T00:51:04.360307624Z" level=info msg="StopPodSandbox for \"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71\"" May 10 00:51:04.410164 kubelet[2201]: I0510 00:51:04.410104 2201 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7b9fb45589-c4vgk" podStartSLOduration=5.029785162 podStartE2EDuration="7.410074071s" podCreationTimestamp="2025-05-10 00:50:57 +0000 UTC" firstStartedPulling="2025-05-10 00:50:58.741483305 +0000 UTC m=+20.036276088" lastFinishedPulling="2025-05-10 00:51:01.121772223 +0000 UTC m=+22.416564997" observedRunningTime="2025-05-10 00:51:01.454776873 +0000 UTC m=+22.749569663" watchObservedRunningTime="2025-05-10 00:51:04.410074071 +0000 UTC m=+25.704866860" May 10 00:51:04.683895 env[1732]: 2025-05-10 00:51:04.410 [INFO][3244] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" May 10 00:51:04.683895 env[1732]: 2025-05-10 00:51:04.410 [INFO][3244] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" iface="eth0" netns="/var/run/netns/cni-db5e2c33-b183-ac05-3edd-18bfc1841274" May 10 00:51:04.683895 env[1732]: 2025-05-10 00:51:04.410 [INFO][3244] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" iface="eth0" netns="/var/run/netns/cni-db5e2c33-b183-ac05-3edd-18bfc1841274" May 10 00:51:04.683895 env[1732]: 2025-05-10 00:51:04.410 [INFO][3244] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" iface="eth0" netns="/var/run/netns/cni-db5e2c33-b183-ac05-3edd-18bfc1841274" May 10 00:51:04.683895 env[1732]: 2025-05-10 00:51:04.410 [INFO][3244] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" May 10 00:51:04.683895 env[1732]: 2025-05-10 00:51:04.410 [INFO][3244] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" May 10 00:51:04.683895 env[1732]: 2025-05-10 00:51:04.652 [INFO][3251] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" HandleID="k8s-pod-network.a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" Workload="172.31.22.34-k8s-csi--node--driver--p22k7-eth0" May 10 00:51:04.683895 env[1732]: 2025-05-10 00:51:04.653 [INFO][3251] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:04.683895 env[1732]: 2025-05-10 00:51:04.660 [INFO][3251] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:04.683895 env[1732]: 2025-05-10 00:51:04.678 [WARNING][3251] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" HandleID="k8s-pod-network.a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" Workload="172.31.22.34-k8s-csi--node--driver--p22k7-eth0" May 10 00:51:04.683895 env[1732]: 2025-05-10 00:51:04.678 [INFO][3251] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" HandleID="k8s-pod-network.a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" Workload="172.31.22.34-k8s-csi--node--driver--p22k7-eth0" May 10 00:51:04.683895 env[1732]: 2025-05-10 00:51:04.681 [INFO][3251] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:04.683895 env[1732]: 2025-05-10 00:51:04.682 [INFO][3244] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" May 10 00:51:04.686083 systemd[1]: run-netns-cni\x2ddb5e2c33\x2db183\x2dac05\x2d3edd\x2d18bfc1841274.mount: Deactivated successfully. May 10 00:51:04.687279 env[1732]: time="2025-05-10T00:51:04.687239813Z" level=info msg="TearDown network for sandbox \"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71\" successfully" May 10 00:51:04.687279 env[1732]: time="2025-05-10T00:51:04.687277168Z" level=info msg="StopPodSandbox for \"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71\" returns successfully" May 10 00:51:04.687984 env[1732]: time="2025-05-10T00:51:04.687951165Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-p22k7,Uid:7ca0d162-d418-45c7-a797-62fb2e6f50f3,Namespace:calico-system,Attempt:1,}" May 10 00:51:04.848988 systemd-networkd[1413]: calid911052bd54: Link UP May 10 00:51:04.851638 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:51:04.851728 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid911052bd54: link becomes ready May 10 00:51:04.851865 systemd-networkd[1413]: calid911052bd54: Gained carrier May 10 00:51:04.851941 (udev-worker)[3276]: Network interface NamePolicy= disabled on kernel command line. May 10 00:51:04.865447 env[1732]: 2025-05-10 00:51:04.741 [INFO][3258] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.34-k8s-csi--node--driver--p22k7-eth0 csi-node-driver- calico-system 7ca0d162-d418-45c7-a797-62fb2e6f50f3 1072 0 2025-05-10 00:50:39 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.31.22.34 csi-node-driver-p22k7 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calid911052bd54 [] []}} ContainerID="98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4" Namespace="calico-system" Pod="csi-node-driver-p22k7" WorkloadEndpoint="172.31.22.34-k8s-csi--node--driver--p22k7-" May 10 00:51:04.865447 env[1732]: 2025-05-10 00:51:04.741 [INFO][3258] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4" Namespace="calico-system" Pod="csi-node-driver-p22k7" WorkloadEndpoint="172.31.22.34-k8s-csi--node--driver--p22k7-eth0" May 10 00:51:04.865447 env[1732]: 2025-05-10 00:51:04.794 [INFO][3270] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4" HandleID="k8s-pod-network.98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4" Workload="172.31.22.34-k8s-csi--node--driver--p22k7-eth0" May 10 00:51:04.865447 env[1732]: 2025-05-10 00:51:04.811 [INFO][3270] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4" HandleID="k8s-pod-network.98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4" Workload="172.31.22.34-k8s-csi--node--driver--p22k7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00052efb0), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.22.34", "pod":"csi-node-driver-p22k7", "timestamp":"2025-05-10 00:51:04.794400359 +0000 UTC"}, Hostname:"172.31.22.34", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:51:04.865447 env[1732]: 2025-05-10 00:51:04.811 [INFO][3270] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:04.865447 env[1732]: 2025-05-10 00:51:04.811 [INFO][3270] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:04.865447 env[1732]: 2025-05-10 00:51:04.811 [INFO][3270] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.34' May 10 00:51:04.865447 env[1732]: 2025-05-10 00:51:04.813 [INFO][3270] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4" host="172.31.22.34" May 10 00:51:04.865447 env[1732]: 2025-05-10 00:51:04.819 [INFO][3270] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.22.34" May 10 00:51:04.865447 env[1732]: 2025-05-10 00:51:04.824 [INFO][3270] ipam/ipam.go 489: Trying affinity for 192.168.113.64/26 host="172.31.22.34" May 10 00:51:04.865447 env[1732]: 2025-05-10 00:51:04.826 [INFO][3270] ipam/ipam.go 155: Attempting to load block cidr=192.168.113.64/26 host="172.31.22.34" May 10 00:51:04.865447 env[1732]: 2025-05-10 00:51:04.829 [INFO][3270] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="172.31.22.34" May 10 00:51:04.865447 env[1732]: 2025-05-10 00:51:04.829 [INFO][3270] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4" host="172.31.22.34" May 10 00:51:04.865447 env[1732]: 2025-05-10 00:51:04.831 [INFO][3270] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4 May 10 00:51:04.865447 env[1732]: 2025-05-10 00:51:04.836 [INFO][3270] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4" host="172.31.22.34" May 10 00:51:04.865447 env[1732]: 2025-05-10 00:51:04.844 [INFO][3270] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.113.66/26] block=192.168.113.64/26 handle="k8s-pod-network.98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4" host="172.31.22.34" May 10 00:51:04.865447 env[1732]: 2025-05-10 00:51:04.844 [INFO][3270] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.66/26] handle="k8s-pod-network.98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4" host="172.31.22.34" May 10 00:51:04.865447 env[1732]: 2025-05-10 00:51:04.844 [INFO][3270] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:04.865447 env[1732]: 2025-05-10 00:51:04.844 [INFO][3270] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.66/26] IPv6=[] ContainerID="98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4" HandleID="k8s-pod-network.98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4" Workload="172.31.22.34-k8s-csi--node--driver--p22k7-eth0" May 10 00:51:04.866180 env[1732]: 2025-05-10 00:51:04.846 [INFO][3258] cni-plugin/k8s.go 386: Populated endpoint ContainerID="98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4" Namespace="calico-system" Pod="csi-node-driver-p22k7" WorkloadEndpoint="172.31.22.34-k8s-csi--node--driver--p22k7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.34-k8s-csi--node--driver--p22k7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7ca0d162-d418-45c7-a797-62fb2e6f50f3", ResourceVersion:"1072", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.34", ContainerID:"", Pod:"csi-node-driver-p22k7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.113.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid911052bd54", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:04.866180 env[1732]: 2025-05-10 00:51:04.846 [INFO][3258] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.113.66/32] ContainerID="98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4" Namespace="calico-system" Pod="csi-node-driver-p22k7" WorkloadEndpoint="172.31.22.34-k8s-csi--node--driver--p22k7-eth0" May 10 00:51:04.866180 env[1732]: 2025-05-10 00:51:04.846 [INFO][3258] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid911052bd54 ContainerID="98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4" Namespace="calico-system" Pod="csi-node-driver-p22k7" WorkloadEndpoint="172.31.22.34-k8s-csi--node--driver--p22k7-eth0" May 10 00:51:04.866180 env[1732]: 2025-05-10 00:51:04.852 [INFO][3258] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4" Namespace="calico-system" Pod="csi-node-driver-p22k7" WorkloadEndpoint="172.31.22.34-k8s-csi--node--driver--p22k7-eth0" May 10 00:51:04.866180 env[1732]: 2025-05-10 00:51:04.852 [INFO][3258] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4" Namespace="calico-system" Pod="csi-node-driver-p22k7" WorkloadEndpoint="172.31.22.34-k8s-csi--node--driver--p22k7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.34-k8s-csi--node--driver--p22k7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7ca0d162-d418-45c7-a797-62fb2e6f50f3", ResourceVersion:"1072", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.34", ContainerID:"98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4", Pod:"csi-node-driver-p22k7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.113.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid911052bd54", MAC:"76:eb:60:a8:5d:86", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:04.866180 env[1732]: 2025-05-10 00:51:04.863 [INFO][3258] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4" Namespace="calico-system" Pod="csi-node-driver-p22k7" WorkloadEndpoint="172.31.22.34-k8s-csi--node--driver--p22k7-eth0" May 10 00:51:04.887179 kernel: kauditd_printk_skb: 529 callbacks suppressed May 10 00:51:04.887389 kernel: audit: type=1325 audit(1746838264.877:378): table=filter:93 family=2 entries=38 op=nft_register_chain pid=3291 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:04.887424 kernel: audit: type=1300 audit(1746838264.877:378): arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffc5e824870 a2=0 a3=7ffc5e82485c items=0 ppid=2902 pid=3291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:04.877000 audit[3291]: NETFILTER_CFG table=filter:93 family=2 entries=38 op=nft_register_chain pid=3291 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:04.877000 audit[3291]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffc5e824870 a2=0 a3=7ffc5e82485c items=0 ppid=2902 pid=3291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:04.887591 env[1732]: time="2025-05-10T00:51:04.882300239Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:51:04.887591 env[1732]: time="2025-05-10T00:51:04.882372246Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:51:04.887591 env[1732]: time="2025-05-10T00:51:04.882393723Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:51:04.887591 env[1732]: time="2025-05-10T00:51:04.882527361Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4 pid=3299 runtime=io.containerd.runc.v2 May 10 00:51:04.877000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:04.893454 kernel: audit: type=1327 audit(1746838264.877:378): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:04.930019 env[1732]: time="2025-05-10T00:51:04.929656014Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-p22k7,Uid:7ca0d162-d418-45c7-a797-62fb2e6f50f3,Namespace:calico-system,Attempt:1,} returns sandbox id \"98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4\"" May 10 00:51:04.931282 env[1732]: time="2025-05-10T00:51:04.931252383Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 10 00:51:05.211920 kubelet[2201]: E0510 00:51:05.211872 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:05.408279 kubelet[2201]: I0510 00:51:05.408042 2201 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:51:05.444000 audit[3334]: NETFILTER_CFG table=filter:94 family=2 entries=8 op=nft_register_rule pid=3334 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:05.444000 audit[3334]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd284751c0 a2=0 a3=7ffd284751ac items=0 ppid=2358 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.452828 kernel: audit: type=1325 audit(1746838265.444:379): table=filter:94 family=2 entries=8 op=nft_register_rule pid=3334 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:05.452970 kernel: audit: type=1300 audit(1746838265.444:379): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd284751c0 a2=0 a3=7ffd284751ac items=0 ppid=2358 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.452998 kernel: audit: type=1327 audit(1746838265.444:379): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:05.444000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:05.456000 audit[3334]: NETFILTER_CFG table=nat:95 family=2 entries=40 op=nft_register_chain pid=3334 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:05.456000 audit[3334]: SYSCALL arch=c000003e syscall=46 success=yes exit=13124 a0=3 a1=7ffd284751c0 a2=0 a3=7ffd284751ac items=0 ppid=2358 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.464586 kernel: audit: type=1325 audit(1746838265.456:380): table=nat:95 family=2 entries=40 op=nft_register_chain pid=3334 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:05.464684 kernel: audit: type=1300 audit(1746838265.456:380): arch=c000003e syscall=46 success=yes exit=13124 a0=3 a1=7ffd284751c0 a2=0 a3=7ffd284751ac items=0 ppid=2358 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.464731 kernel: audit: type=1327 audit(1746838265.456:380): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:05.456000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:05.494000 audit[3336]: NETFILTER_CFG table=filter:96 family=2 entries=8 op=nft_register_rule pid=3336 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:05.494000 audit[3336]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdca7f4220 a2=0 a3=7ffdca7f420c items=0 ppid=2358 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.499863 kernel: audit: type=1325 audit(1746838265.494:381): table=filter:96 family=2 entries=8 op=nft_register_rule pid=3336 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:05.494000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:05.500000 audit[3336]: NETFILTER_CFG table=nat:97 family=2 entries=40 op=nft_unregister_chain pid=3336 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:05.500000 audit[3336]: SYSCALL arch=c000003e syscall=46 success=yes exit=11364 a0=3 a1=7ffdca7f4220 a2=0 a3=7ffdca7f420c items=0 ppid=2358 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.500000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:06.082585 systemd-networkd[1413]: calid911052bd54: Gained IPv6LL May 10 00:51:06.194393 env[1732]: time="2025-05-10T00:51:06.194308554Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:06.197641 env[1732]: time="2025-05-10T00:51:06.197600422Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:06.210364 env[1732]: time="2025-05-10T00:51:06.210287162Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:06.212877 kubelet[2201]: E0510 00:51:06.212785 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:06.219452 env[1732]: time="2025-05-10T00:51:06.219406963Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:06.220220 env[1732]: time="2025-05-10T00:51:06.220188419Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 10 00:51:06.222404 env[1732]: time="2025-05-10T00:51:06.222372595Z" level=info msg="CreateContainer within sandbox \"98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 10 00:51:06.242194 env[1732]: time="2025-05-10T00:51:06.242148030Z" level=info msg="CreateContainer within sandbox \"98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"032ca571af2ff07131cbfae187ce5b43985793844cc67d1829aec9127292a435\"" May 10 00:51:06.242916 env[1732]: time="2025-05-10T00:51:06.242892395Z" level=info msg="StartContainer for \"032ca571af2ff07131cbfae187ce5b43985793844cc67d1829aec9127292a435\"" May 10 00:51:06.308838 env[1732]: time="2025-05-10T00:51:06.308794837Z" level=info msg="StartContainer for \"032ca571af2ff07131cbfae187ce5b43985793844cc67d1829aec9127292a435\" returns successfully" May 10 00:51:06.310411 env[1732]: time="2025-05-10T00:51:06.310377967Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 10 00:51:06.511000 audit[3373]: NETFILTER_CFG table=filter:98 family=2 entries=8 op=nft_register_rule pid=3373 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:06.511000 audit[3373]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc22a566d0 a2=0 a3=7ffc22a566bc items=0 ppid=2358 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:06.511000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:06.517000 audit[3373]: NETFILTER_CFG table=nat:99 family=2 entries=36 op=nft_register_rule pid=3373 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:06.517000 audit[3373]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffc22a566d0 a2=0 a3=7ffc22a566bc items=0 ppid=2358 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:06.517000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:07.213825 kubelet[2201]: E0510 00:51:07.213774 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:07.513606 update_engine[1724]: I0510 00:51:07.512920 1724 update_attempter.cc:509] Updating boot flags... May 10 00:51:07.811097 env[1732]: time="2025-05-10T00:51:07.810782660Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:07.813307 env[1732]: time="2025-05-10T00:51:07.813265868Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:07.815273 env[1732]: time="2025-05-10T00:51:07.815233466Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:07.817799 env[1732]: time="2025-05-10T00:51:07.817334451Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:07.817799 env[1732]: time="2025-05-10T00:51:07.817702570Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 10 00:51:07.820207 env[1732]: time="2025-05-10T00:51:07.820168152Z" level=info msg="CreateContainer within sandbox \"98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 10 00:51:07.834603 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount85034681.mount: Deactivated successfully. May 10 00:51:07.841686 env[1732]: time="2025-05-10T00:51:07.841638423Z" level=info msg="CreateContainer within sandbox \"98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"4c8219f55a7e071561ba2057c17b0324a5abe486be009954a23393b51de455f4\"" May 10 00:51:07.842363 env[1732]: time="2025-05-10T00:51:07.842320309Z" level=info msg="StartContainer for \"4c8219f55a7e071561ba2057c17b0324a5abe486be009954a23393b51de455f4\"" May 10 00:51:07.905399 env[1732]: time="2025-05-10T00:51:07.904976654Z" level=info msg="StartContainer for \"4c8219f55a7e071561ba2057c17b0324a5abe486be009954a23393b51de455f4\" returns successfully" May 10 00:51:08.215010 kubelet[2201]: E0510 00:51:08.214891 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:08.288772 kubelet[2201]: I0510 00:51:08.288732 2201 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 10 00:51:08.288772 kubelet[2201]: I0510 00:51:08.288769 2201 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 10 00:51:09.215229 kubelet[2201]: E0510 00:51:09.215174 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:10.215896 kubelet[2201]: E0510 00:51:10.215862 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:10.361209 env[1732]: time="2025-05-10T00:51:10.361174210Z" level=info msg="StopPodSandbox for \"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c\"" May 10 00:51:10.409446 kubelet[2201]: I0510 00:51:10.409374 2201 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-p22k7" podStartSLOduration=28.521294414 podStartE2EDuration="31.409354182s" podCreationTimestamp="2025-05-10 00:50:39 +0000 UTC" firstStartedPulling="2025-05-10 00:51:04.930892391 +0000 UTC m=+26.225685165" lastFinishedPulling="2025-05-10 00:51:07.81895216 +0000 UTC m=+29.113744933" observedRunningTime="2025-05-10 00:51:08.46901645 +0000 UTC m=+29.763809238" watchObservedRunningTime="2025-05-10 00:51:10.409354182 +0000 UTC m=+31.704146972" May 10 00:51:10.445902 env[1732]: 2025-05-10 00:51:10.409 [INFO][3526] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" May 10 00:51:10.445902 env[1732]: 2025-05-10 00:51:10.409 [INFO][3526] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" iface="eth0" netns="/var/run/netns/cni-79cb6bd5-ec93-7c68-265f-f7bd9df0a435" May 10 00:51:10.445902 env[1732]: 2025-05-10 00:51:10.409 [INFO][3526] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" iface="eth0" netns="/var/run/netns/cni-79cb6bd5-ec93-7c68-265f-f7bd9df0a435" May 10 00:51:10.445902 env[1732]: 2025-05-10 00:51:10.409 [INFO][3526] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" iface="eth0" netns="/var/run/netns/cni-79cb6bd5-ec93-7c68-265f-f7bd9df0a435" May 10 00:51:10.445902 env[1732]: 2025-05-10 00:51:10.409 [INFO][3526] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" May 10 00:51:10.445902 env[1732]: 2025-05-10 00:51:10.409 [INFO][3526] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" May 10 00:51:10.445902 env[1732]: 2025-05-10 00:51:10.434 [INFO][3534] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" HandleID="k8s-pod-network.92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" Workload="172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0" May 10 00:51:10.445902 env[1732]: 2025-05-10 00:51:10.435 [INFO][3534] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:10.445902 env[1732]: 2025-05-10 00:51:10.435 [INFO][3534] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:10.445902 env[1732]: 2025-05-10 00:51:10.441 [WARNING][3534] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" HandleID="k8s-pod-network.92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" Workload="172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0" May 10 00:51:10.445902 env[1732]: 2025-05-10 00:51:10.441 [INFO][3534] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" HandleID="k8s-pod-network.92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" Workload="172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0" May 10 00:51:10.445902 env[1732]: 2025-05-10 00:51:10.442 [INFO][3534] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:10.445902 env[1732]: 2025-05-10 00:51:10.444 [INFO][3526] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" May 10 00:51:10.449107 systemd[1]: run-netns-cni\x2d79cb6bd5\x2dec93\x2d7c68\x2d265f\x2df7bd9df0a435.mount: Deactivated successfully. May 10 00:51:10.451009 env[1732]: time="2025-05-10T00:51:10.450545542Z" level=info msg="TearDown network for sandbox \"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c\" successfully" May 10 00:51:10.451009 env[1732]: time="2025-05-10T00:51:10.450595371Z" level=info msg="StopPodSandbox for \"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c\" returns successfully" May 10 00:51:10.451484 env[1732]: time="2025-05-10T00:51:10.451447690Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-csqvj,Uid:531d80d8-cda2-4dc6-8483-b0f2133abf81,Namespace:default,Attempt:1,}" May 10 00:51:10.629413 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:51:10.629527 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali095f9b9da77: link becomes ready May 10 00:51:10.629177 systemd-networkd[1413]: cali095f9b9da77: Link UP May 10 00:51:10.629868 (udev-worker)[3318]: Network interface NamePolicy= disabled on kernel command line. May 10 00:51:10.630883 systemd-networkd[1413]: cali095f9b9da77: Gained carrier May 10 00:51:10.643089 env[1732]: 2025-05-10 00:51:10.544 [INFO][3540] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0 nginx-deployment-85f456d6dd- default 531d80d8-cda2-4dc6-8483-b0f2133abf81 1134 0 2025-05-10 00:50:53 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.22.34 nginx-deployment-85f456d6dd-csqvj eth0 default [] [] [kns.default ksa.default.default] cali095f9b9da77 [] []}} ContainerID="bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb" Namespace="default" Pod="nginx-deployment-85f456d6dd-csqvj" WorkloadEndpoint="172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-" May 10 00:51:10.643089 env[1732]: 2025-05-10 00:51:10.545 [INFO][3540] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb" Namespace="default" Pod="nginx-deployment-85f456d6dd-csqvj" WorkloadEndpoint="172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0" May 10 00:51:10.643089 env[1732]: 2025-05-10 00:51:10.583 [INFO][3553] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb" HandleID="k8s-pod-network.bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb" Workload="172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0" May 10 00:51:10.643089 env[1732]: 2025-05-10 00:51:10.593 [INFO][3553] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb" HandleID="k8s-pod-network.bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb" Workload="172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031ba70), Attrs:map[string]string{"namespace":"default", "node":"172.31.22.34", "pod":"nginx-deployment-85f456d6dd-csqvj", "timestamp":"2025-05-10 00:51:10.583593946 +0000 UTC"}, Hostname:"172.31.22.34", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:51:10.643089 env[1732]: 2025-05-10 00:51:10.593 [INFO][3553] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:10.643089 env[1732]: 2025-05-10 00:51:10.593 [INFO][3553] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:10.643089 env[1732]: 2025-05-10 00:51:10.593 [INFO][3553] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.34' May 10 00:51:10.643089 env[1732]: 2025-05-10 00:51:10.595 [INFO][3553] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb" host="172.31.22.34" May 10 00:51:10.643089 env[1732]: 2025-05-10 00:51:10.600 [INFO][3553] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.22.34" May 10 00:51:10.643089 env[1732]: 2025-05-10 00:51:10.605 [INFO][3553] ipam/ipam.go 489: Trying affinity for 192.168.113.64/26 host="172.31.22.34" May 10 00:51:10.643089 env[1732]: 2025-05-10 00:51:10.607 [INFO][3553] ipam/ipam.go 155: Attempting to load block cidr=192.168.113.64/26 host="172.31.22.34" May 10 00:51:10.643089 env[1732]: 2025-05-10 00:51:10.609 [INFO][3553] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="172.31.22.34" May 10 00:51:10.643089 env[1732]: 2025-05-10 00:51:10.609 [INFO][3553] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb" host="172.31.22.34" May 10 00:51:10.643089 env[1732]: 2025-05-10 00:51:10.611 [INFO][3553] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb May 10 00:51:10.643089 env[1732]: 2025-05-10 00:51:10.617 [INFO][3553] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb" host="172.31.22.34" May 10 00:51:10.643089 env[1732]: 2025-05-10 00:51:10.623 [INFO][3553] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.113.67/26] block=192.168.113.64/26 handle="k8s-pod-network.bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb" host="172.31.22.34" May 10 00:51:10.643089 env[1732]: 2025-05-10 00:51:10.623 [INFO][3553] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.67/26] handle="k8s-pod-network.bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb" host="172.31.22.34" May 10 00:51:10.643089 env[1732]: 2025-05-10 00:51:10.623 [INFO][3553] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:10.643089 env[1732]: 2025-05-10 00:51:10.623 [INFO][3553] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.67/26] IPv6=[] ContainerID="bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb" HandleID="k8s-pod-network.bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb" Workload="172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0" May 10 00:51:10.643899 env[1732]: 2025-05-10 00:51:10.625 [INFO][3540] cni-plugin/k8s.go 386: Populated endpoint ContainerID="bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb" Namespace="default" Pod="nginx-deployment-85f456d6dd-csqvj" WorkloadEndpoint="172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"531d80d8-cda2-4dc6-8483-b0f2133abf81", ResourceVersion:"1134", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.34", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-csqvj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali095f9b9da77", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:10.643899 env[1732]: 2025-05-10 00:51:10.625 [INFO][3540] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.113.67/32] ContainerID="bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb" Namespace="default" Pod="nginx-deployment-85f456d6dd-csqvj" WorkloadEndpoint="172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0" May 10 00:51:10.643899 env[1732]: 2025-05-10 00:51:10.625 [INFO][3540] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali095f9b9da77 ContainerID="bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb" Namespace="default" Pod="nginx-deployment-85f456d6dd-csqvj" WorkloadEndpoint="172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0" May 10 00:51:10.643899 env[1732]: 2025-05-10 00:51:10.631 [INFO][3540] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb" Namespace="default" Pod="nginx-deployment-85f456d6dd-csqvj" WorkloadEndpoint="172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0" May 10 00:51:10.643899 env[1732]: 2025-05-10 00:51:10.632 [INFO][3540] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb" Namespace="default" Pod="nginx-deployment-85f456d6dd-csqvj" WorkloadEndpoint="172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"531d80d8-cda2-4dc6-8483-b0f2133abf81", ResourceVersion:"1134", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.34", ContainerID:"bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb", Pod:"nginx-deployment-85f456d6dd-csqvj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali095f9b9da77", MAC:"06:3d:e0:2a:4b:bb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:10.643899 env[1732]: 2025-05-10 00:51:10.640 [INFO][3540] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb" Namespace="default" Pod="nginx-deployment-85f456d6dd-csqvj" WorkloadEndpoint="172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0" May 10 00:51:10.656888 kernel: kauditd_printk_skb: 11 callbacks suppressed May 10 00:51:10.657005 kernel: audit: type=1325 audit(1746838270.651:385): table=filter:100 family=2 entries=42 op=nft_register_chain pid=3573 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:10.657036 kernel: audit: type=1300 audit(1746838270.651:385): arch=c000003e syscall=46 success=yes exit=21500 a0=3 a1=7ffd665e4610 a2=0 a3=7ffd665e45fc items=0 ppid=2902 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:10.651000 audit[3573]: NETFILTER_CFG table=filter:100 family=2 entries=42 op=nft_register_chain pid=3573 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:10.651000 audit[3573]: SYSCALL arch=c000003e syscall=46 success=yes exit=21500 a0=3 a1=7ffd665e4610 a2=0 a3=7ffd665e45fc items=0 ppid=2902 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:10.651000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:10.666577 env[1732]: time="2025-05-10T00:51:10.666426297Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:51:10.666577 env[1732]: time="2025-05-10T00:51:10.666466483Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:51:10.666577 env[1732]: time="2025-05-10T00:51:10.666476973Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:51:10.666866 kernel: audit: type=1327 audit(1746838270.651:385): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:10.667043 env[1732]: time="2025-05-10T00:51:10.666990475Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb pid=3582 runtime=io.containerd.runc.v2 May 10 00:51:10.734058 env[1732]: time="2025-05-10T00:51:10.734017121Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-csqvj,Uid:531d80d8-cda2-4dc6-8483-b0f2133abf81,Namespace:default,Attempt:1,} returns sandbox id \"bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb\"" May 10 00:51:10.735732 env[1732]: time="2025-05-10T00:51:10.735699561Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 10 00:51:11.216205 kubelet[2201]: E0510 00:51:11.216168 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:12.216996 kubelet[2201]: E0510 00:51:12.216953 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:12.289666 systemd-networkd[1413]: cali095f9b9da77: Gained IPv6LL May 10 00:51:13.217741 kubelet[2201]: E0510 00:51:13.217677 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:13.225323 amazon-ssm-agent[1896]: 2025-05-10 00:51:13 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated May 10 00:51:13.415082 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount738364247.mount: Deactivated successfully. May 10 00:51:14.218252 kubelet[2201]: E0510 00:51:14.218035 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:14.964552 env[1732]: time="2025-05-10T00:51:14.964499467Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:14.966971 env[1732]: time="2025-05-10T00:51:14.966934337Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:14.969189 env[1732]: time="2025-05-10T00:51:14.969159760Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:14.970812 env[1732]: time="2025-05-10T00:51:14.970783051Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:14.971566 env[1732]: time="2025-05-10T00:51:14.971536662Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 10 00:51:14.974219 env[1732]: time="2025-05-10T00:51:14.974189413Z" level=info msg="CreateContainer within sandbox \"bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 10 00:51:14.988672 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1444908315.mount: Deactivated successfully. May 10 00:51:14.995978 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2223847262.mount: Deactivated successfully. May 10 00:51:15.001056 env[1732]: time="2025-05-10T00:51:15.001003801Z" level=info msg="CreateContainer within sandbox \"bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"b98cd826fae7e28e4e4aff4ad881007353da78b46e8d9b4d612d78755470ae58\"" May 10 00:51:15.001687 env[1732]: time="2025-05-10T00:51:15.001631485Z" level=info msg="StartContainer for \"b98cd826fae7e28e4e4aff4ad881007353da78b46e8d9b4d612d78755470ae58\"" May 10 00:51:15.062515 env[1732]: time="2025-05-10T00:51:15.062470518Z" level=info msg="StartContainer for \"b98cd826fae7e28e4e4aff4ad881007353da78b46e8d9b4d612d78755470ae58\" returns successfully" May 10 00:51:15.219040 kubelet[2201]: E0510 00:51:15.218916 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:15.480278 kubelet[2201]: I0510 00:51:15.479970 2201 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-csqvj" podStartSLOduration=18.242476543 podStartE2EDuration="22.479954501s" podCreationTimestamp="2025-05-10 00:50:53 +0000 UTC" firstStartedPulling="2025-05-10 00:51:10.735429977 +0000 UTC m=+32.030222752" lastFinishedPulling="2025-05-10 00:51:14.972907936 +0000 UTC m=+36.267700710" observedRunningTime="2025-05-10 00:51:15.479917943 +0000 UTC m=+36.774710790" watchObservedRunningTime="2025-05-10 00:51:15.479954501 +0000 UTC m=+36.774747294" May 10 00:51:16.220108 kubelet[2201]: E0510 00:51:16.220063 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:17.220548 kubelet[2201]: E0510 00:51:17.220508 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:18.220760 kubelet[2201]: E0510 00:51:18.220698 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:19.192176 kubelet[2201]: E0510 00:51:19.192110 2201 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:19.221858 kubelet[2201]: E0510 00:51:19.221797 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:20.222495 kubelet[2201]: E0510 00:51:20.222441 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:20.338664 kubelet[2201]: I0510 00:51:20.338622 2201 topology_manager.go:215] "Topology Admit Handler" podUID="d2271f31-adf5-438e-806d-6c4a8508b7de" podNamespace="calico-system" podName="calico-typha-598c4b76c6-6mjrm" May 10 00:51:20.395000 audit[3680]: NETFILTER_CFG table=filter:101 family=2 entries=8 op=nft_register_rule pid=3680 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:20.395000 audit[3680]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff030ae6d0 a2=0 a3=7fff030ae6bc items=0 ppid=2358 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:20.404488 kernel: audit: type=1325 audit(1746838280.395:386): table=filter:101 family=2 entries=8 op=nft_register_rule pid=3680 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:20.404624 kernel: audit: type=1300 audit(1746838280.395:386): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff030ae6d0 a2=0 a3=7fff030ae6bc items=0 ppid=2358 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:20.404667 kernel: audit: type=1327 audit(1746838280.395:386): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:20.395000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:20.408000 audit[3680]: NETFILTER_CFG table=nat:102 family=2 entries=30 op=nft_register_rule pid=3680 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:20.408000 audit[3680]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff030ae6d0 a2=0 a3=7fff030ae6bc items=0 ppid=2358 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:20.416818 kernel: audit: type=1325 audit(1746838280.408:387): table=nat:102 family=2 entries=30 op=nft_register_rule pid=3680 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:20.416961 kernel: audit: type=1300 audit(1746838280.408:387): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff030ae6d0 a2=0 a3=7fff030ae6bc items=0 ppid=2358 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:20.416996 kernel: audit: type=1327 audit(1746838280.408:387): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:20.408000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:20.424000 audit[3682]: NETFILTER_CFG table=filter:103 family=2 entries=8 op=nft_register_rule pid=3682 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:20.424000 audit[3682]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd5d854630 a2=0 a3=7ffd5d85461c items=0 ppid=2358 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:20.432755 kernel: audit: type=1325 audit(1746838280.424:388): table=filter:103 family=2 entries=8 op=nft_register_rule pid=3682 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:20.432905 kernel: audit: type=1300 audit(1746838280.424:388): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd5d854630 a2=0 a3=7ffd5d85461c items=0 ppid=2358 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:20.432943 kernel: audit: type=1327 audit(1746838280.424:388): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:20.424000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:20.427000 audit[3682]: NETFILTER_CFG table=nat:104 family=2 entries=30 op=nft_register_rule pid=3682 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:20.437531 kernel: audit: type=1325 audit(1746838280.427:389): table=nat:104 family=2 entries=30 op=nft_register_rule pid=3682 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:20.427000 audit[3682]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd5d854630 a2=0 a3=7ffd5d85461c items=0 ppid=2358 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:20.427000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:20.524266 kubelet[2201]: I0510 00:51:20.524215 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d2271f31-adf5-438e-806d-6c4a8508b7de-tigera-ca-bundle\") pod \"calico-typha-598c4b76c6-6mjrm\" (UID: \"d2271f31-adf5-438e-806d-6c4a8508b7de\") " pod="calico-system/calico-typha-598c4b76c6-6mjrm" May 10 00:51:20.524477 kubelet[2201]: I0510 00:51:20.524284 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8s5m8\" (UniqueName: \"kubernetes.io/projected/d2271f31-adf5-438e-806d-6c4a8508b7de-kube-api-access-8s5m8\") pod \"calico-typha-598c4b76c6-6mjrm\" (UID: \"d2271f31-adf5-438e-806d-6c4a8508b7de\") " pod="calico-system/calico-typha-598c4b76c6-6mjrm" May 10 00:51:20.524477 kubelet[2201]: I0510 00:51:20.524305 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/d2271f31-adf5-438e-806d-6c4a8508b7de-typha-certs\") pod \"calico-typha-598c4b76c6-6mjrm\" (UID: \"d2271f31-adf5-438e-806d-6c4a8508b7de\") " pod="calico-system/calico-typha-598c4b76c6-6mjrm" May 10 00:51:20.562999 systemd[1]: run-containerd-runc-k8s.io-29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65-runc.STEaLI.mount: Deactivated successfully. May 10 00:51:20.597083 systemd[1]: run-containerd-runc-k8s.io-29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65-runc.Bt7ROX.mount: Deactivated successfully. May 10 00:51:20.744081 env[1732]: time="2025-05-10T00:51:20.744043715Z" level=info msg="StopContainer for \"29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65\" with timeout 5 (s)" May 10 00:51:20.744543 env[1732]: time="2025-05-10T00:51:20.744252468Z" level=info msg="Stop container \"29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65\" with signal terminated" May 10 00:51:20.786112 env[1732]: time="2025-05-10T00:51:20.785566843Z" level=info msg="shim disconnected" id=29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65 May 10 00:51:20.786112 env[1732]: time="2025-05-10T00:51:20.785621557Z" level=warning msg="cleaning up after shim disconnected" id=29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65 namespace=k8s.io May 10 00:51:20.786112 env[1732]: time="2025-05-10T00:51:20.785633590Z" level=info msg="cleaning up dead shim" May 10 00:51:20.795399 env[1732]: time="2025-05-10T00:51:20.795344002Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3748 runtime=io.containerd.runc.v2\n" May 10 00:51:20.910542 env[1732]: time="2025-05-10T00:51:20.910496606Z" level=info msg="StopContainer for \"29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65\" returns successfully" May 10 00:51:20.911091 env[1732]: time="2025-05-10T00:51:20.911055428Z" level=info msg="StopPodSandbox for \"64d2400b72829c277fdc47b74c073d10768d91f5d6f4759a8b42027f75db1069\"" May 10 00:51:20.911197 env[1732]: time="2025-05-10T00:51:20.911111056Z" level=info msg="Container to stop \"4a5871e8adc1d03390db2e8c1895624eb19c979d60ae6fa350f7443fa7c3c65d\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:51:20.911197 env[1732]: time="2025-05-10T00:51:20.911123979Z" level=info msg="Container to stop \"0b9da8ce4515355bb4bf751c8846bf18b78e6440dcfc6d43d7ffa7d4fa880094\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:51:20.911197 env[1732]: time="2025-05-10T00:51:20.911134463Z" level=info msg="Container to stop \"29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:51:20.932785 env[1732]: time="2025-05-10T00:51:20.932734740Z" level=info msg="shim disconnected" id=64d2400b72829c277fdc47b74c073d10768d91f5d6f4759a8b42027f75db1069 May 10 00:51:20.933064 env[1732]: time="2025-05-10T00:51:20.933044104Z" level=warning msg="cleaning up after shim disconnected" id=64d2400b72829c277fdc47b74c073d10768d91f5d6f4759a8b42027f75db1069 namespace=k8s.io May 10 00:51:20.933224 env[1732]: time="2025-05-10T00:51:20.933211627Z" level=info msg="cleaning up dead shim" May 10 00:51:20.941688 env[1732]: time="2025-05-10T00:51:20.941637787Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-598c4b76c6-6mjrm,Uid:d2271f31-adf5-438e-806d-6c4a8508b7de,Namespace:calico-system,Attempt:0,}" May 10 00:51:20.943283 env[1732]: time="2025-05-10T00:51:20.943242229Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3783 runtime=io.containerd.runc.v2\n" May 10 00:51:20.953038 env[1732]: time="2025-05-10T00:51:20.952993245Z" level=info msg="TearDown network for sandbox \"64d2400b72829c277fdc47b74c073d10768d91f5d6f4759a8b42027f75db1069\" successfully" May 10 00:51:20.953038 env[1732]: time="2025-05-10T00:51:20.953028788Z" level=info msg="StopPodSandbox for \"64d2400b72829c277fdc47b74c073d10768d91f5d6f4759a8b42027f75db1069\" returns successfully" May 10 00:51:20.971876 env[1732]: time="2025-05-10T00:51:20.971759399Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:51:20.972078 env[1732]: time="2025-05-10T00:51:20.971806661Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:51:20.972078 env[1732]: time="2025-05-10T00:51:20.971863409Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:51:20.972201 env[1732]: time="2025-05-10T00:51:20.972060475Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1371895b4815a73a48c2f46c3cd8cdf75787c4a468e4b5c157e49a939b78380e pid=3803 runtime=io.containerd.runc.v2 May 10 00:51:21.029206 kubelet[2201]: I0510 00:51:21.029164 2201 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-8mvlr\" (UniqueName: \"kubernetes.io/projected/603f2066-be7b-4650-a9cd-3671e70e40c2-kube-api-access-8mvlr\") pod \"603f2066-be7b-4650-a9cd-3671e70e40c2\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " May 10 00:51:21.029390 kubelet[2201]: I0510 00:51:21.029249 2201 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-policysync\") pod \"603f2066-be7b-4650-a9cd-3671e70e40c2\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " May 10 00:51:21.029390 kubelet[2201]: I0510 00:51:21.029272 2201 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-cni-net-dir\") pod \"603f2066-be7b-4650-a9cd-3671e70e40c2\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " May 10 00:51:21.029390 kubelet[2201]: I0510 00:51:21.029308 2201 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-flexvol-driver-host\") pod \"603f2066-be7b-4650-a9cd-3671e70e40c2\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " May 10 00:51:21.029390 kubelet[2201]: I0510 00:51:21.029330 2201 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-var-lib-calico\") pod \"603f2066-be7b-4650-a9cd-3671e70e40c2\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " May 10 00:51:21.029390 kubelet[2201]: I0510 00:51:21.029349 2201 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-lib-modules\") pod \"603f2066-be7b-4650-a9cd-3671e70e40c2\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " May 10 00:51:21.029623 kubelet[2201]: I0510 00:51:21.029392 2201 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/603f2066-be7b-4650-a9cd-3671e70e40c2-node-certs\") pod \"603f2066-be7b-4650-a9cd-3671e70e40c2\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " May 10 00:51:21.029623 kubelet[2201]: I0510 00:51:21.029414 2201 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-xtables-lock\") pod \"603f2066-be7b-4650-a9cd-3671e70e40c2\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " May 10 00:51:21.029623 kubelet[2201]: I0510 00:51:21.029438 2201 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-var-run-calico\") pod \"603f2066-be7b-4650-a9cd-3671e70e40c2\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " May 10 00:51:21.029623 kubelet[2201]: I0510 00:51:21.029476 2201 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-cni-bin-dir\") pod \"603f2066-be7b-4650-a9cd-3671e70e40c2\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " May 10 00:51:21.029623 kubelet[2201]: I0510 00:51:21.029509 2201 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-cni-log-dir\") pod \"603f2066-be7b-4650-a9cd-3671e70e40c2\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " May 10 00:51:21.029623 kubelet[2201]: I0510 00:51:21.029549 2201 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/603f2066-be7b-4650-a9cd-3671e70e40c2-tigera-ca-bundle\") pod \"603f2066-be7b-4650-a9cd-3671e70e40c2\" (UID: \"603f2066-be7b-4650-a9cd-3671e70e40c2\") " May 10 00:51:21.030391 kubelet[2201]: I0510 00:51:21.030339 2201 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-policysync" (OuterVolumeSpecName: "policysync") pod "603f2066-be7b-4650-a9cd-3671e70e40c2" (UID: "603f2066-be7b-4650-a9cd-3671e70e40c2"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:51:21.030492 kubelet[2201]: I0510 00:51:21.030422 2201 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "603f2066-be7b-4650-a9cd-3671e70e40c2" (UID: "603f2066-be7b-4650-a9cd-3671e70e40c2"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:51:21.030492 kubelet[2201]: I0510 00:51:21.030461 2201 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "603f2066-be7b-4650-a9cd-3671e70e40c2" (UID: "603f2066-be7b-4650-a9cd-3671e70e40c2"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:51:21.030492 kubelet[2201]: I0510 00:51:21.030483 2201 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "603f2066-be7b-4650-a9cd-3671e70e40c2" (UID: "603f2066-be7b-4650-a9cd-3671e70e40c2"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:51:21.030640 kubelet[2201]: I0510 00:51:21.030505 2201 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "603f2066-be7b-4650-a9cd-3671e70e40c2" (UID: "603f2066-be7b-4650-a9cd-3671e70e40c2"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:51:21.034866 kubelet[2201]: I0510 00:51:21.033144 2201 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "603f2066-be7b-4650-a9cd-3671e70e40c2" (UID: "603f2066-be7b-4650-a9cd-3671e70e40c2"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:51:21.034866 kubelet[2201]: I0510 00:51:21.033210 2201 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "603f2066-be7b-4650-a9cd-3671e70e40c2" (UID: "603f2066-be7b-4650-a9cd-3671e70e40c2"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:51:21.034866 kubelet[2201]: I0510 00:51:21.033238 2201 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "603f2066-be7b-4650-a9cd-3671e70e40c2" (UID: "603f2066-be7b-4650-a9cd-3671e70e40c2"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:51:21.034866 kubelet[2201]: I0510 00:51:21.033263 2201 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "603f2066-be7b-4650-a9cd-3671e70e40c2" (UID: "603f2066-be7b-4650-a9cd-3671e70e40c2"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:51:21.038134 kubelet[2201]: I0510 00:51:21.036540 2201 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/603f2066-be7b-4650-a9cd-3671e70e40c2-node-certs" (OuterVolumeSpecName: "node-certs") pod "603f2066-be7b-4650-a9cd-3671e70e40c2" (UID: "603f2066-be7b-4650-a9cd-3671e70e40c2"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" May 10 00:51:21.041206 kubelet[2201]: I0510 00:51:21.039402 2201 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/603f2066-be7b-4650-a9cd-3671e70e40c2-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "603f2066-be7b-4650-a9cd-3671e70e40c2" (UID: "603f2066-be7b-4650-a9cd-3671e70e40c2"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 10 00:51:21.041381 kubelet[2201]: I0510 00:51:21.038009 2201 topology_manager.go:215] "Topology Admit Handler" podUID="72e62bc6-cc17-49af-8f65-ddc35b4a39fd" podNamespace="calico-system" podName="calico-node-c54d5" May 10 00:51:21.043912 kubelet[2201]: E0510 00:51:21.043888 2201 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="603f2066-be7b-4650-a9cd-3671e70e40c2" containerName="calico-node" May 10 00:51:21.045573 kubelet[2201]: E0510 00:51:21.045542 2201 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="603f2066-be7b-4650-a9cd-3671e70e40c2" containerName="flexvol-driver" May 10 00:51:21.045713 env[1732]: time="2025-05-10T00:51:21.045548581Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-598c4b76c6-6mjrm,Uid:d2271f31-adf5-438e-806d-6c4a8508b7de,Namespace:calico-system,Attempt:0,} returns sandbox id \"1371895b4815a73a48c2f46c3cd8cdf75787c4a468e4b5c157e49a939b78380e\"" May 10 00:51:21.045808 kubelet[2201]: E0510 00:51:21.045796 2201 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="603f2066-be7b-4650-a9cd-3671e70e40c2" containerName="install-cni" May 10 00:51:21.047616 env[1732]: time="2025-05-10T00:51:21.047570429Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 10 00:51:21.050236 kubelet[2201]: I0510 00:51:21.050214 2201 memory_manager.go:354] "RemoveStaleState removing state" podUID="603f2066-be7b-4650-a9cd-3671e70e40c2" containerName="calico-node" May 10 00:51:21.056688 kubelet[2201]: I0510 00:51:21.056658 2201 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/603f2066-be7b-4650-a9cd-3671e70e40c2-kube-api-access-8mvlr" (OuterVolumeSpecName: "kube-api-access-8mvlr") pod "603f2066-be7b-4650-a9cd-3671e70e40c2" (UID: "603f2066-be7b-4650-a9cd-3671e70e40c2"). InnerVolumeSpecName "kube-api-access-8mvlr". PluginName "kubernetes.io/projected", VolumeGidValue "" May 10 00:51:21.130352 kubelet[2201]: I0510 00:51:21.130302 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/72e62bc6-cc17-49af-8f65-ddc35b4a39fd-cni-bin-dir\") pod \"calico-node-c54d5\" (UID: \"72e62bc6-cc17-49af-8f65-ddc35b4a39fd\") " pod="calico-system/calico-node-c54d5" May 10 00:51:21.130352 kubelet[2201]: I0510 00:51:21.130345 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/72e62bc6-cc17-49af-8f65-ddc35b4a39fd-policysync\") pod \"calico-node-c54d5\" (UID: \"72e62bc6-cc17-49af-8f65-ddc35b4a39fd\") " pod="calico-system/calico-node-c54d5" May 10 00:51:21.130352 kubelet[2201]: I0510 00:51:21.130361 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/72e62bc6-cc17-49af-8f65-ddc35b4a39fd-tigera-ca-bundle\") pod \"calico-node-c54d5\" (UID: \"72e62bc6-cc17-49af-8f65-ddc35b4a39fd\") " pod="calico-system/calico-node-c54d5" May 10 00:51:21.130589 kubelet[2201]: I0510 00:51:21.130378 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/72e62bc6-cc17-49af-8f65-ddc35b4a39fd-xtables-lock\") pod \"calico-node-c54d5\" (UID: \"72e62bc6-cc17-49af-8f65-ddc35b4a39fd\") " pod="calico-system/calico-node-c54d5" May 10 00:51:21.130589 kubelet[2201]: I0510 00:51:21.130399 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vqwzc\" (UniqueName: \"kubernetes.io/projected/72e62bc6-cc17-49af-8f65-ddc35b4a39fd-kube-api-access-vqwzc\") pod \"calico-node-c54d5\" (UID: \"72e62bc6-cc17-49af-8f65-ddc35b4a39fd\") " pod="calico-system/calico-node-c54d5" May 10 00:51:21.130589 kubelet[2201]: I0510 00:51:21.130418 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/72e62bc6-cc17-49af-8f65-ddc35b4a39fd-node-certs\") pod \"calico-node-c54d5\" (UID: \"72e62bc6-cc17-49af-8f65-ddc35b4a39fd\") " pod="calico-system/calico-node-c54d5" May 10 00:51:21.130589 kubelet[2201]: I0510 00:51:21.130435 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/72e62bc6-cc17-49af-8f65-ddc35b4a39fd-var-run-calico\") pod \"calico-node-c54d5\" (UID: \"72e62bc6-cc17-49af-8f65-ddc35b4a39fd\") " pod="calico-system/calico-node-c54d5" May 10 00:51:21.130589 kubelet[2201]: I0510 00:51:21.130451 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/72e62bc6-cc17-49af-8f65-ddc35b4a39fd-var-lib-calico\") pod \"calico-node-c54d5\" (UID: \"72e62bc6-cc17-49af-8f65-ddc35b4a39fd\") " pod="calico-system/calico-node-c54d5" May 10 00:51:21.130736 kubelet[2201]: I0510 00:51:21.130467 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/72e62bc6-cc17-49af-8f65-ddc35b4a39fd-cni-net-dir\") pod \"calico-node-c54d5\" (UID: \"72e62bc6-cc17-49af-8f65-ddc35b4a39fd\") " pod="calico-system/calico-node-c54d5" May 10 00:51:21.130736 kubelet[2201]: I0510 00:51:21.130482 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/72e62bc6-cc17-49af-8f65-ddc35b4a39fd-flexvol-driver-host\") pod \"calico-node-c54d5\" (UID: \"72e62bc6-cc17-49af-8f65-ddc35b4a39fd\") " pod="calico-system/calico-node-c54d5" May 10 00:51:21.130736 kubelet[2201]: I0510 00:51:21.130496 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/72e62bc6-cc17-49af-8f65-ddc35b4a39fd-cni-log-dir\") pod \"calico-node-c54d5\" (UID: \"72e62bc6-cc17-49af-8f65-ddc35b4a39fd\") " pod="calico-system/calico-node-c54d5" May 10 00:51:21.130736 kubelet[2201]: I0510 00:51:21.130513 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/72e62bc6-cc17-49af-8f65-ddc35b4a39fd-lib-modules\") pod \"calico-node-c54d5\" (UID: \"72e62bc6-cc17-49af-8f65-ddc35b4a39fd\") " pod="calico-system/calico-node-c54d5" May 10 00:51:21.130736 kubelet[2201]: I0510 00:51:21.130534 2201 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-8mvlr\" (UniqueName: \"kubernetes.io/projected/603f2066-be7b-4650-a9cd-3671e70e40c2-kube-api-access-8mvlr\") on node \"172.31.22.34\" DevicePath \"\"" May 10 00:51:21.130736 kubelet[2201]: I0510 00:51:21.130543 2201 reconciler_common.go:289] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-policysync\") on node \"172.31.22.34\" DevicePath \"\"" May 10 00:51:21.130933 kubelet[2201]: I0510 00:51:21.130551 2201 reconciler_common.go:289] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-cni-net-dir\") on node \"172.31.22.34\" DevicePath \"\"" May 10 00:51:21.130933 kubelet[2201]: I0510 00:51:21.130559 2201 reconciler_common.go:289] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-flexvol-driver-host\") on node \"172.31.22.34\" DevicePath \"\"" May 10 00:51:21.130933 kubelet[2201]: I0510 00:51:21.130567 2201 reconciler_common.go:289] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-var-lib-calico\") on node \"172.31.22.34\" DevicePath \"\"" May 10 00:51:21.130933 kubelet[2201]: I0510 00:51:21.130575 2201 reconciler_common.go:289] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-lib-modules\") on node \"172.31.22.34\" DevicePath \"\"" May 10 00:51:21.130933 kubelet[2201]: I0510 00:51:21.130582 2201 reconciler_common.go:289] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/603f2066-be7b-4650-a9cd-3671e70e40c2-node-certs\") on node \"172.31.22.34\" DevicePath \"\"" May 10 00:51:21.130933 kubelet[2201]: I0510 00:51:21.130590 2201 reconciler_common.go:289] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-xtables-lock\") on node \"172.31.22.34\" DevicePath \"\"" May 10 00:51:21.130933 kubelet[2201]: I0510 00:51:21.130598 2201 reconciler_common.go:289] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-var-run-calico\") on node \"172.31.22.34\" DevicePath \"\"" May 10 00:51:21.130933 kubelet[2201]: I0510 00:51:21.130606 2201 reconciler_common.go:289] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-cni-bin-dir\") on node \"172.31.22.34\" DevicePath \"\"" May 10 00:51:21.131151 kubelet[2201]: I0510 00:51:21.130613 2201 reconciler_common.go:289] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/603f2066-be7b-4650-a9cd-3671e70e40c2-cni-log-dir\") on node \"172.31.22.34\" DevicePath \"\"" May 10 00:51:21.131151 kubelet[2201]: I0510 00:51:21.130620 2201 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/603f2066-be7b-4650-a9cd-3671e70e40c2-tigera-ca-bundle\") on node \"172.31.22.34\" DevicePath \"\"" May 10 00:51:21.223483 kubelet[2201]: E0510 00:51:21.223444 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:21.355728 env[1732]: time="2025-05-10T00:51:21.355575611Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-c54d5,Uid:72e62bc6-cc17-49af-8f65-ddc35b4a39fd,Namespace:calico-system,Attempt:0,}" May 10 00:51:21.392540 env[1732]: time="2025-05-10T00:51:21.392337705Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:51:21.392540 env[1732]: time="2025-05-10T00:51:21.392515308Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:51:21.392776 env[1732]: time="2025-05-10T00:51:21.392738373Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:51:21.393058 env[1732]: time="2025-05-10T00:51:21.393007424Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/adb4242272e017eec6095682e5493a28533b52a064abda267c7f52ca02e0cdbc pid=3852 runtime=io.containerd.runc.v2 May 10 00:51:21.434538 env[1732]: time="2025-05-10T00:51:21.434491465Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-c54d5,Uid:72e62bc6-cc17-49af-8f65-ddc35b4a39fd,Namespace:calico-system,Attempt:0,} returns sandbox id \"adb4242272e017eec6095682e5493a28533b52a064abda267c7f52ca02e0cdbc\"" May 10 00:51:21.437456 env[1732]: time="2025-05-10T00:51:21.437414028Z" level=info msg="CreateContainer within sandbox \"adb4242272e017eec6095682e5493a28533b52a064abda267c7f52ca02e0cdbc\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 00:51:21.453000 audit[3888]: NETFILTER_CFG table=filter:105 family=2 entries=20 op=nft_register_rule pid=3888 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:21.453000 audit[3888]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffcd6e7740 a2=0 a3=7fffcd6e772c items=0 ppid=2358 pid=3888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:21.453000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:21.457000 audit[3888]: NETFILTER_CFG table=nat:106 family=2 entries=22 op=nft_register_rule pid=3888 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:21.457000 audit[3888]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffcd6e7740 a2=0 a3=0 items=0 ppid=2358 pid=3888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:21.457000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:21.466612 env[1732]: time="2025-05-10T00:51:21.466554886Z" level=info msg="CreateContainer within sandbox \"adb4242272e017eec6095682e5493a28533b52a064abda267c7f52ca02e0cdbc\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"8668f61584652d5d73365dd1a6ee0ee0bb70b6549b4bfe845843480b40423759\"" May 10 00:51:21.467108 env[1732]: time="2025-05-10T00:51:21.467040961Z" level=info msg="StartContainer for \"8668f61584652d5d73365dd1a6ee0ee0bb70b6549b4bfe845843480b40423759\"" May 10 00:51:21.481830 kubelet[2201]: I0510 00:51:21.481803 2201 scope.go:117] "RemoveContainer" containerID="29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65" May 10 00:51:21.483776 env[1732]: time="2025-05-10T00:51:21.483742050Z" level=info msg="RemoveContainer for \"29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65\"" May 10 00:51:21.495285 env[1732]: time="2025-05-10T00:51:21.495239218Z" level=info msg="RemoveContainer for \"29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65\" returns successfully" May 10 00:51:21.495869 kubelet[2201]: I0510 00:51:21.495827 2201 scope.go:117] "RemoveContainer" containerID="0b9da8ce4515355bb4bf751c8846bf18b78e6440dcfc6d43d7ffa7d4fa880094" May 10 00:51:21.503306 env[1732]: time="2025-05-10T00:51:21.502220707Z" level=info msg="RemoveContainer for \"0b9da8ce4515355bb4bf751c8846bf18b78e6440dcfc6d43d7ffa7d4fa880094\"" May 10 00:51:21.530561 env[1732]: time="2025-05-10T00:51:21.530493018Z" level=info msg="RemoveContainer for \"0b9da8ce4515355bb4bf751c8846bf18b78e6440dcfc6d43d7ffa7d4fa880094\" returns successfully" May 10 00:51:21.531261 kubelet[2201]: I0510 00:51:21.531089 2201 scope.go:117] "RemoveContainer" containerID="4a5871e8adc1d03390db2e8c1895624eb19c979d60ae6fa350f7443fa7c3c65d" May 10 00:51:21.533555 env[1732]: time="2025-05-10T00:51:21.533518134Z" level=info msg="RemoveContainer for \"4a5871e8adc1d03390db2e8c1895624eb19c979d60ae6fa350f7443fa7c3c65d\"" May 10 00:51:21.541434 env[1732]: time="2025-05-10T00:51:21.541393637Z" level=info msg="RemoveContainer for \"4a5871e8adc1d03390db2e8c1895624eb19c979d60ae6fa350f7443fa7c3c65d\" returns successfully" May 10 00:51:21.541994 kubelet[2201]: I0510 00:51:21.541830 2201 scope.go:117] "RemoveContainer" containerID="29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65" May 10 00:51:21.542241 env[1732]: time="2025-05-10T00:51:21.542150498Z" level=error msg="ContainerStatus for \"29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65\": not found" May 10 00:51:21.542406 kubelet[2201]: E0510 00:51:21.542379 2201 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65\": not found" containerID="29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65" May 10 00:51:21.542481 kubelet[2201]: I0510 00:51:21.542417 2201 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65"} err="failed to get container status \"29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65\": rpc error: code = NotFound desc = an error occurred when try to find container \"29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65\": not found" May 10 00:51:21.542481 kubelet[2201]: I0510 00:51:21.542444 2201 scope.go:117] "RemoveContainer" containerID="0b9da8ce4515355bb4bf751c8846bf18b78e6440dcfc6d43d7ffa7d4fa880094" May 10 00:51:21.542729 env[1732]: time="2025-05-10T00:51:21.542673823Z" level=error msg="ContainerStatus for \"0b9da8ce4515355bb4bf751c8846bf18b78e6440dcfc6d43d7ffa7d4fa880094\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"0b9da8ce4515355bb4bf751c8846bf18b78e6440dcfc6d43d7ffa7d4fa880094\": not found" May 10 00:51:21.543031 kubelet[2201]: E0510 00:51:21.542998 2201 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"0b9da8ce4515355bb4bf751c8846bf18b78e6440dcfc6d43d7ffa7d4fa880094\": not found" containerID="0b9da8ce4515355bb4bf751c8846bf18b78e6440dcfc6d43d7ffa7d4fa880094" May 10 00:51:21.543117 kubelet[2201]: I0510 00:51:21.543029 2201 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"0b9da8ce4515355bb4bf751c8846bf18b78e6440dcfc6d43d7ffa7d4fa880094"} err="failed to get container status \"0b9da8ce4515355bb4bf751c8846bf18b78e6440dcfc6d43d7ffa7d4fa880094\": rpc error: code = NotFound desc = an error occurred when try to find container \"0b9da8ce4515355bb4bf751c8846bf18b78e6440dcfc6d43d7ffa7d4fa880094\": not found" May 10 00:51:21.543117 kubelet[2201]: I0510 00:51:21.543054 2201 scope.go:117] "RemoveContainer" containerID="4a5871e8adc1d03390db2e8c1895624eb19c979d60ae6fa350f7443fa7c3c65d" May 10 00:51:21.543431 env[1732]: time="2025-05-10T00:51:21.543370799Z" level=error msg="ContainerStatus for \"4a5871e8adc1d03390db2e8c1895624eb19c979d60ae6fa350f7443fa7c3c65d\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"4a5871e8adc1d03390db2e8c1895624eb19c979d60ae6fa350f7443fa7c3c65d\": not found" May 10 00:51:21.543681 kubelet[2201]: E0510 00:51:21.543657 2201 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"4a5871e8adc1d03390db2e8c1895624eb19c979d60ae6fa350f7443fa7c3c65d\": not found" containerID="4a5871e8adc1d03390db2e8c1895624eb19c979d60ae6fa350f7443fa7c3c65d" May 10 00:51:21.543775 kubelet[2201]: I0510 00:51:21.543691 2201 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"4a5871e8adc1d03390db2e8c1895624eb19c979d60ae6fa350f7443fa7c3c65d"} err="failed to get container status \"4a5871e8adc1d03390db2e8c1895624eb19c979d60ae6fa350f7443fa7c3c65d\": rpc error: code = NotFound desc = an error occurred when try to find container \"4a5871e8adc1d03390db2e8c1895624eb19c979d60ae6fa350f7443fa7c3c65d\": not found" May 10 00:51:21.562070 env[1732]: time="2025-05-10T00:51:21.562017374Z" level=info msg="StartContainer for \"8668f61584652d5d73365dd1a6ee0ee0bb70b6549b4bfe845843480b40423759\" returns successfully" May 10 00:51:21.571659 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-29f69b48ce41a159915d5ea84a00c9af1316b678e46fe6c3de2a849da3819e65-rootfs.mount: Deactivated successfully. May 10 00:51:21.571870 systemd[1]: var-lib-kubelet-pods-603f2066\x2dbe7b\x2d4650\x2da9cd\x2d3671e70e40c2-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. May 10 00:51:21.572023 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-64d2400b72829c277fdc47b74c073d10768d91f5d6f4759a8b42027f75db1069-rootfs.mount: Deactivated successfully. May 10 00:51:21.572154 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-64d2400b72829c277fdc47b74c073d10768d91f5d6f4759a8b42027f75db1069-shm.mount: Deactivated successfully. May 10 00:51:21.572290 systemd[1]: var-lib-kubelet-pods-603f2066\x2dbe7b\x2d4650\x2da9cd\x2d3671e70e40c2-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d8mvlr.mount: Deactivated successfully. May 10 00:51:21.572487 systemd[1]: var-lib-kubelet-pods-603f2066\x2dbe7b\x2d4650\x2da9cd\x2d3671e70e40c2-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. May 10 00:51:21.805584 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8668f61584652d5d73365dd1a6ee0ee0bb70b6549b4bfe845843480b40423759-rootfs.mount: Deactivated successfully. May 10 00:51:21.832678 env[1732]: time="2025-05-10T00:51:21.832626764Z" level=info msg="shim disconnected" id=8668f61584652d5d73365dd1a6ee0ee0bb70b6549b4bfe845843480b40423759 May 10 00:51:21.832678 env[1732]: time="2025-05-10T00:51:21.832672330Z" level=warning msg="cleaning up after shim disconnected" id=8668f61584652d5d73365dd1a6ee0ee0bb70b6549b4bfe845843480b40423759 namespace=k8s.io May 10 00:51:21.832678 env[1732]: time="2025-05-10T00:51:21.832682876Z" level=info msg="cleaning up dead shim" May 10 00:51:21.841033 env[1732]: time="2025-05-10T00:51:21.840989611Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3936 runtime=io.containerd.runc.v2\n" May 10 00:51:22.224191 kubelet[2201]: E0510 00:51:22.224031 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:22.488440 env[1732]: time="2025-05-10T00:51:22.488311386Z" level=info msg="CreateContainer within sandbox \"adb4242272e017eec6095682e5493a28533b52a064abda267c7f52ca02e0cdbc\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 00:51:22.509896 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3670411013.mount: Deactivated successfully. May 10 00:51:22.516628 env[1732]: time="2025-05-10T00:51:22.516572855Z" level=info msg="CreateContainer within sandbox \"adb4242272e017eec6095682e5493a28533b52a064abda267c7f52ca02e0cdbc\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"85d38a7abf88dbbcb993e46160378d430b0d2c040a85069885205eefb791155c\"" May 10 00:51:22.517605 env[1732]: time="2025-05-10T00:51:22.517557816Z" level=info msg="StartContainer for \"85d38a7abf88dbbcb993e46160378d430b0d2c040a85069885205eefb791155c\"" May 10 00:51:22.609713 env[1732]: time="2025-05-10T00:51:22.609643753Z" level=info msg="StartContainer for \"85d38a7abf88dbbcb993e46160378d430b0d2c040a85069885205eefb791155c\" returns successfully" May 10 00:51:23.094384 env[1732]: time="2025-05-10T00:51:23.094311764Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:23.097178 env[1732]: time="2025-05-10T00:51:23.097135494Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:23.099210 env[1732]: time="2025-05-10T00:51:23.099179472Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:23.101045 env[1732]: time="2025-05-10T00:51:23.100997424Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:23.101741 env[1732]: time="2025-05-10T00:51:23.101703695Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 10 00:51:23.122035 env[1732]: time="2025-05-10T00:51:23.121992457Z" level=info msg="CreateContainer within sandbox \"1371895b4815a73a48c2f46c3cd8cdf75787c4a468e4b5c157e49a939b78380e\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 10 00:51:23.138085 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1908979025.mount: Deactivated successfully. May 10 00:51:23.142771 env[1732]: time="2025-05-10T00:51:23.142722354Z" level=info msg="CreateContainer within sandbox \"1371895b4815a73a48c2f46c3cd8cdf75787c4a468e4b5c157e49a939b78380e\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"7d2c5b663bf6fa375f8fb5c519fc29aa351a6462ba1ffbe7cdb1f43987f47482\"" May 10 00:51:23.143517 env[1732]: time="2025-05-10T00:51:23.143475491Z" level=info msg="StartContainer for \"7d2c5b663bf6fa375f8fb5c519fc29aa351a6462ba1ffbe7cdb1f43987f47482\"" May 10 00:51:23.224928 kubelet[2201]: E0510 00:51:23.224811 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:23.227986 env[1732]: time="2025-05-10T00:51:23.227837519Z" level=info msg="StartContainer for \"7d2c5b663bf6fa375f8fb5c519fc29aa351a6462ba1ffbe7cdb1f43987f47482\" returns successfully" May 10 00:51:23.364241 kubelet[2201]: I0510 00:51:23.364084 2201 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="603f2066-be7b-4650-a9cd-3671e70e40c2" path="/var/lib/kubelet/pods/603f2066-be7b-4650-a9cd-3671e70e40c2/volumes" May 10 00:51:23.525201 kubelet[2201]: I0510 00:51:23.525148 2201 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-598c4b76c6-6mjrm" podStartSLOduration=1.4689191670000001 podStartE2EDuration="3.525132481s" podCreationTimestamp="2025-05-10 00:51:20 +0000 UTC" firstStartedPulling="2025-05-10 00:51:21.047020981 +0000 UTC m=+42.341813757" lastFinishedPulling="2025-05-10 00:51:23.103234297 +0000 UTC m=+44.398027071" observedRunningTime="2025-05-10 00:51:23.525022065 +0000 UTC m=+44.819814859" watchObservedRunningTime="2025-05-10 00:51:23.525132481 +0000 UTC m=+44.819925273" May 10 00:51:23.568000 audit[4022]: NETFILTER_CFG table=filter:107 family=2 entries=32 op=nft_register_rule pid=4022 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:23.568000 audit[4022]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff6d8120d0 a2=0 a3=7fff6d8120bc items=0 ppid=2358 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:23.568000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:23.571000 audit[4022]: NETFILTER_CFG table=nat:108 family=2 entries=32 op=nft_register_chain pid=4022 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:23.571000 audit[4022]: SYSCALL arch=c000003e syscall=46 success=yes exit=9476 a0=3 a1=7fff6d8120d0 a2=0 a3=7fff6d8120bc items=0 ppid=2358 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:23.571000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:24.225025 kubelet[2201]: E0510 00:51:24.224970 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:24.946000 audit[4025]: NETFILTER_CFG table=filter:109 family=2 entries=32 op=nft_register_rule pid=4025 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:24.946000 audit[4025]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe41c23ae0 a2=0 a3=7ffe41c23acc items=0 ppid=2358 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.946000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:24.951000 audit[4025]: NETFILTER_CFG table=nat:110 family=2 entries=30 op=nft_register_rule pid=4025 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:24.951000 audit[4025]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe41c23ae0 a2=0 a3=0 items=0 ppid=2358 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.951000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:25.225503 kubelet[2201]: E0510 00:51:25.225377 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:25.713837 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-85d38a7abf88dbbcb993e46160378d430b0d2c040a85069885205eefb791155c-rootfs.mount: Deactivated successfully. May 10 00:51:25.746928 env[1732]: time="2025-05-10T00:51:25.746883049Z" level=info msg="shim disconnected" id=85d38a7abf88dbbcb993e46160378d430b0d2c040a85069885205eefb791155c May 10 00:51:25.747424 env[1732]: time="2025-05-10T00:51:25.747377839Z" level=warning msg="cleaning up after shim disconnected" id=85d38a7abf88dbbcb993e46160378d430b0d2c040a85069885205eefb791155c namespace=k8s.io May 10 00:51:25.747424 env[1732]: time="2025-05-10T00:51:25.747403362Z" level=info msg="cleaning up dead shim" May 10 00:51:25.759428 env[1732]: time="2025-05-10T00:51:25.759384920Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4040 runtime=io.containerd.runc.v2\n" May 10 00:51:26.225743 kubelet[2201]: E0510 00:51:26.225703 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:26.514483 env[1732]: time="2025-05-10T00:51:26.514417307Z" level=info msg="CreateContainer within sandbox \"adb4242272e017eec6095682e5493a28533b52a064abda267c7f52ca02e0cdbc\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 00:51:26.531929 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount620071850.mount: Deactivated successfully. May 10 00:51:26.544180 env[1732]: time="2025-05-10T00:51:26.544122278Z" level=info msg="CreateContainer within sandbox \"adb4242272e017eec6095682e5493a28533b52a064abda267c7f52ca02e0cdbc\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"c380e3b24541a77a157baa0ab255555b7b085a5216a6ba95cd7a24850534e2d3\"" May 10 00:51:26.545038 env[1732]: time="2025-05-10T00:51:26.544968703Z" level=info msg="StartContainer for \"c380e3b24541a77a157baa0ab255555b7b085a5216a6ba95cd7a24850534e2d3\"" May 10 00:51:26.601554 env[1732]: time="2025-05-10T00:51:26.601496043Z" level=info msg="StartContainer for \"c380e3b24541a77a157baa0ab255555b7b085a5216a6ba95cd7a24850534e2d3\" returns successfully" May 10 00:51:26.800929 kubelet[2201]: I0510 00:51:26.799218 2201 topology_manager.go:215] "Topology Admit Handler" podUID="f1123a63-ed68-437d-ba46-ac3817157cd5" podNamespace="default" podName="nfs-server-provisioner-0" May 10 00:51:26.964771 kubelet[2201]: I0510 00:51:26.964729 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/f1123a63-ed68-437d-ba46-ac3817157cd5-data\") pod \"nfs-server-provisioner-0\" (UID: \"f1123a63-ed68-437d-ba46-ac3817157cd5\") " pod="default/nfs-server-provisioner-0" May 10 00:51:26.964771 kubelet[2201]: I0510 00:51:26.964775 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jb6bt\" (UniqueName: \"kubernetes.io/projected/f1123a63-ed68-437d-ba46-ac3817157cd5-kube-api-access-jb6bt\") pod \"nfs-server-provisioner-0\" (UID: \"f1123a63-ed68-437d-ba46-ac3817157cd5\") " pod="default/nfs-server-provisioner-0" May 10 00:51:27.102471 env[1732]: time="2025-05-10T00:51:27.102341216Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:f1123a63-ed68-437d-ba46-ac3817157cd5,Namespace:default,Attempt:0,}" May 10 00:51:27.240810 kubelet[2201]: E0510 00:51:27.240772 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:27.289994 systemd-networkd[1413]: cali60e51b789ff: Link UP May 10 00:51:27.290919 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:51:27.290957 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 10 00:51:27.291278 systemd-networkd[1413]: cali60e51b789ff: Gained carrier May 10 00:51:27.293122 (udev-worker)[4130]: Network interface NamePolicy= disabled on kernel command line. May 10 00:51:27.307050 env[1732]: 2025-05-10 00:51:27.172 [INFO][4111] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.34-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default f1123a63-ed68-437d-ba46-ac3817157cd5 1331 0 2025-05-10 00:51:21 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.22.34 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.34-k8s-nfs--server--provisioner--0-" May 10 00:51:27.307050 env[1732]: 2025-05-10 00:51:27.172 [INFO][4111] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.34-k8s-nfs--server--provisioner--0-eth0" May 10 00:51:27.307050 env[1732]: 2025-05-10 00:51:27.201 [INFO][4123] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411" HandleID="k8s-pod-network.31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411" Workload="172.31.22.34-k8s-nfs--server--provisioner--0-eth0" May 10 00:51:27.307050 env[1732]: 2025-05-10 00:51:27.210 [INFO][4123] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411" HandleID="k8s-pod-network.31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411" Workload="172.31.22.34-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003049a0), Attrs:map[string]string{"namespace":"default", "node":"172.31.22.34", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-10 00:51:27.201067872 +0000 UTC"}, Hostname:"172.31.22.34", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:51:27.307050 env[1732]: 2025-05-10 00:51:27.210 [INFO][4123] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:27.307050 env[1732]: 2025-05-10 00:51:27.210 [INFO][4123] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:27.307050 env[1732]: 2025-05-10 00:51:27.210 [INFO][4123] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.34' May 10 00:51:27.307050 env[1732]: 2025-05-10 00:51:27.212 [INFO][4123] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411" host="172.31.22.34" May 10 00:51:27.307050 env[1732]: 2025-05-10 00:51:27.241 [INFO][4123] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.22.34" May 10 00:51:27.307050 env[1732]: 2025-05-10 00:51:27.258 [INFO][4123] ipam/ipam.go 489: Trying affinity for 192.168.113.64/26 host="172.31.22.34" May 10 00:51:27.307050 env[1732]: 2025-05-10 00:51:27.260 [INFO][4123] ipam/ipam.go 155: Attempting to load block cidr=192.168.113.64/26 host="172.31.22.34" May 10 00:51:27.307050 env[1732]: 2025-05-10 00:51:27.264 [INFO][4123] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="172.31.22.34" May 10 00:51:27.307050 env[1732]: 2025-05-10 00:51:27.264 [INFO][4123] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411" host="172.31.22.34" May 10 00:51:27.307050 env[1732]: 2025-05-10 00:51:27.266 [INFO][4123] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411 May 10 00:51:27.307050 env[1732]: 2025-05-10 00:51:27.272 [INFO][4123] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411" host="172.31.22.34" May 10 00:51:27.307050 env[1732]: 2025-05-10 00:51:27.284 [INFO][4123] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.113.68/26] block=192.168.113.64/26 handle="k8s-pod-network.31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411" host="172.31.22.34" May 10 00:51:27.307050 env[1732]: 2025-05-10 00:51:27.284 [INFO][4123] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.68/26] handle="k8s-pod-network.31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411" host="172.31.22.34" May 10 00:51:27.307050 env[1732]: 2025-05-10 00:51:27.284 [INFO][4123] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:27.307050 env[1732]: 2025-05-10 00:51:27.284 [INFO][4123] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.68/26] IPv6=[] ContainerID="31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411" HandleID="k8s-pod-network.31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411" Workload="172.31.22.34-k8s-nfs--server--provisioner--0-eth0" May 10 00:51:27.307754 env[1732]: 2025-05-10 00:51:27.286 [INFO][4111] cni-plugin/k8s.go 386: Populated endpoint ContainerID="31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.34-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.34-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"f1123a63-ed68-437d-ba46-ac3817157cd5", ResourceVersion:"1331", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 51, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.34", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.113.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:27.307754 env[1732]: 2025-05-10 00:51:27.286 [INFO][4111] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.113.68/32] ContainerID="31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.34-k8s-nfs--server--provisioner--0-eth0" May 10 00:51:27.307754 env[1732]: 2025-05-10 00:51:27.286 [INFO][4111] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.34-k8s-nfs--server--provisioner--0-eth0" May 10 00:51:27.307754 env[1732]: 2025-05-10 00:51:27.290 [INFO][4111] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.34-k8s-nfs--server--provisioner--0-eth0" May 10 00:51:27.307949 env[1732]: 2025-05-10 00:51:27.291 [INFO][4111] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.34-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.34-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"f1123a63-ed68-437d-ba46-ac3817157cd5", ResourceVersion:"1331", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 51, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.34", ContainerID:"31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.113.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"3e:73:63:71:45:24", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:27.307949 env[1732]: 2025-05-10 00:51:27.305 [INFO][4111] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.34-k8s-nfs--server--provisioner--0-eth0" May 10 00:51:27.320724 env[1732]: time="2025-05-10T00:51:27.320592773Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:51:27.320724 env[1732]: time="2025-05-10T00:51:27.320670290Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:51:27.320724 env[1732]: time="2025-05-10T00:51:27.320691454Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:51:27.321117 env[1732]: time="2025-05-10T00:51:27.321063716Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411 pid=4149 runtime=io.containerd.runc.v2 May 10 00:51:27.385313 env[1732]: time="2025-05-10T00:51:27.383172334Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:f1123a63-ed68-437d-ba46-ac3817157cd5,Namespace:default,Attempt:0,} returns sandbox id \"31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411\"" May 10 00:51:27.385602 env[1732]: time="2025-05-10T00:51:27.385569590Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 10 00:51:27.521282 kubelet[2201]: I0510 00:51:27.520988 2201 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-c54d5" podStartSLOduration=6.520970396 podStartE2EDuration="6.520970396s" podCreationTimestamp="2025-05-10 00:51:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:51:27.520887527 +0000 UTC m=+48.815680319" watchObservedRunningTime="2025-05-10 00:51:27.520970396 +0000 UTC m=+48.815763188" May 10 00:51:28.042804 kernel: kauditd_printk_skb: 20 callbacks suppressed May 10 00:51:28.043009 kernel: audit: type=1400 audit(1746838288.031:396): avc: denied { write } for pid=4261 comm="tee" name="fd" dev="proc" ino=25501 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:28.031000 audit[4261]: AVC avc: denied { write } for pid=4261 comm="tee" name="fd" dev="proc" ino=25501 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:28.031000 audit[4261]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe8edda1d a2=241 a3=1b6 items=1 ppid=4223 pid=4261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.059985 kernel: audit: type=1300 audit(1746838288.031:396): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe8edda1d a2=241 a3=1b6 items=1 ppid=4223 pid=4261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.031000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 00:51:28.078879 kernel: audit: type=1307 audit(1746838288.031:396): cwd="/etc/service/enabled/felix/log" May 10 00:51:28.031000 audit: PATH item=0 name="/dev/fd/63" inode=24486 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:28.092873 kernel: audit: type=1302 audit(1746838288.031:396): item=0 name="/dev/fd/63" inode=24486 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:28.031000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:28.109933 kernel: audit: type=1327 audit(1746838288.031:396): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:28.069000 audit[4249]: AVC avc: denied { write } for pid=4249 comm="tee" name="fd" dev="proc" ino=24495 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:28.131868 kernel: audit: type=1400 audit(1746838288.069:397): avc: denied { write } for pid=4249 comm="tee" name="fd" dev="proc" ino=24495 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:28.154867 kernel: audit: type=1300 audit(1746838288.069:397): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9a1d6a1f a2=241 a3=1b6 items=1 ppid=4219 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.069000 audit[4249]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9a1d6a1f a2=241 a3=1b6 items=1 ppid=4219 pid=4249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.069000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 00:51:28.170864 kernel: audit: type=1307 audit(1746838288.069:397): cwd="/etc/service/enabled/cni/log" May 10 00:51:28.069000 audit: PATH item=0 name="/dev/fd/63" inode=24470 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:28.183886 kernel: audit: type=1302 audit(1746838288.069:397): item=0 name="/dev/fd/63" inode=24470 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:28.069000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:28.205922 kernel: audit: type=1327 audit(1746838288.069:397): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:28.070000 audit[4256]: AVC avc: denied { write } for pid=4256 comm="tee" name="fd" dev="proc" ino=24497 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:28.070000 audit[4256]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9e768a0e a2=241 a3=1b6 items=1 ppid=4221 pid=4256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.070000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 00:51:28.070000 audit: PATH item=0 name="/dev/fd/63" inode=24480 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:28.070000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:28.071000 audit[4253]: AVC avc: denied { write } for pid=4253 comm="tee" name="fd" dev="proc" ino=24499 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:28.071000 audit[4253]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc36afaa1d a2=241 a3=1b6 items=1 ppid=4222 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.071000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 00:51:28.071000 audit: PATH item=0 name="/dev/fd/63" inode=24479 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:28.071000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:28.101000 audit[4279]: AVC avc: denied { write } for pid=4279 comm="tee" name="fd" dev="proc" ino=25511 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:28.101000 audit[4279]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffdb9d6a1e a2=241 a3=1b6 items=1 ppid=4216 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.101000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 00:51:28.101000 audit: PATH item=0 name="/dev/fd/63" inode=24505 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:28.101000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:28.117000 audit[4277]: AVC avc: denied { write } for pid=4277 comm="tee" name="fd" dev="proc" ino=24509 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:28.117000 audit[4277]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1fccda1d a2=241 a3=1b6 items=1 ppid=4215 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.117000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 00:51:28.117000 audit: PATH item=0 name="/dev/fd/63" inode=25508 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:28.117000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:28.139000 audit[4285]: AVC avc: denied { write } for pid=4285 comm="tee" name="fd" dev="proc" ino=24515 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:28.139000 audit[4285]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf4e43a0d a2=241 a3=1b6 items=1 ppid=4227 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.139000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 00:51:28.139000 audit: PATH item=0 name="/dev/fd/63" inode=24506 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:28.139000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:28.245180 kubelet[2201]: E0510 00:51:28.245108 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:28.483000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.483000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.483000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.483000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.483000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.483000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.483000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.483000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.483000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.483000 audit: BPF prog-id=29 op=LOAD May 10 00:51:28.483000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd303a6680 a2=98 a3=3 items=0 ppid=4225 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.483000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:28.487000 audit: BPF prog-id=29 op=UNLOAD May 10 00:51:28.487000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.487000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.487000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.487000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.487000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.487000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.487000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.487000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.487000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.487000 audit: BPF prog-id=30 op=LOAD May 10 00:51:28.487000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd303a6460 a2=74 a3=540051 items=0 ppid=4225 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.487000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:28.487000 audit: BPF prog-id=30 op=UNLOAD May 10 00:51:28.487000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.487000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.487000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.487000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.487000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.487000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.487000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.487000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.487000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.487000 audit: BPF prog-id=31 op=LOAD May 10 00:51:28.487000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd303a6490 a2=94 a3=2 items=0 ppid=4225 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.487000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:28.489000 audit: BPF prog-id=31 op=UNLOAD May 10 00:51:28.671996 systemd-networkd[1413]: cali60e51b789ff: Gained IPv6LL May 10 00:51:28.765000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.765000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.765000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.765000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.765000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.765000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.765000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.765000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.765000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.765000 audit: BPF prog-id=32 op=LOAD May 10 00:51:28.765000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd303a6350 a2=40 a3=1 items=0 ppid=4225 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.765000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:28.767000 audit: BPF prog-id=32 op=UNLOAD May 10 00:51:28.767000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.767000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd303a6420 a2=50 a3=7ffd303a6500 items=0 ppid=4225 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.767000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:28.781000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.781000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd303a6360 a2=28 a3=0 items=0 ppid=4225 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.781000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:28.782000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.782000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd303a6390 a2=28 a3=0 items=0 ppid=4225 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.782000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:28.782000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.782000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd303a62a0 a2=28 a3=0 items=0 ppid=4225 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.782000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:28.782000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.782000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd303a63b0 a2=28 a3=0 items=0 ppid=4225 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.782000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:28.783000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.783000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd303a6390 a2=28 a3=0 items=0 ppid=4225 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.783000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:28.783000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.783000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd303a6380 a2=28 a3=0 items=0 ppid=4225 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.783000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:28.784000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.784000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd303a63b0 a2=28 a3=0 items=0 ppid=4225 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.784000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:28.784000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.784000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd303a6390 a2=28 a3=0 items=0 ppid=4225 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.784000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:28.785000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.785000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd303a63b0 a2=28 a3=0 items=0 ppid=4225 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.785000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:28.785000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.785000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd303a6380 a2=28 a3=0 items=0 ppid=4225 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.785000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:28.785000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.785000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd303a63f0 a2=28 a3=0 items=0 ppid=4225 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.785000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:28.786000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.786000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd303a61a0 a2=50 a3=1 items=0 ppid=4225 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.786000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:28.786000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.786000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.786000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.786000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.786000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.786000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.786000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.786000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.786000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.786000 audit: BPF prog-id=33 op=LOAD May 10 00:51:28.786000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd303a61a0 a2=94 a3=5 items=0 ppid=4225 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.786000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:28.787000 audit: BPF prog-id=33 op=UNLOAD May 10 00:51:28.787000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.787000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd303a6250 a2=50 a3=1 items=0 ppid=4225 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.787000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:28.787000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.787000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd303a6370 a2=4 a3=38 items=0 ppid=4225 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.787000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:28.787000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.787000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.787000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.787000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.787000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.787000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.787000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.787000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.787000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.787000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.787000 audit[4322]: AVC avc: denied { confidentiality } for pid=4322 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:28.787000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd303a63c0 a2=94 a3=6 items=0 ppid=4225 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.787000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:28.788000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.788000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.788000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.788000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.788000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.788000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.788000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.788000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.788000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.788000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.788000 audit[4322]: AVC avc: denied { confidentiality } for pid=4322 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:28.788000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd303a5b70 a2=94 a3=83 items=0 ppid=4225 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.788000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:28.788000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.788000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.788000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.788000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.788000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.788000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.788000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.788000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.788000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.788000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.788000 audit[4322]: AVC avc: denied { confidentiality } for pid=4322 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:28.788000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd303a5b70 a2=94 a3=83 items=0 ppid=4225 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.788000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:28.829000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit: BPF prog-id=34 op=LOAD May 10 00:51:28.829000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb88ac830 a2=98 a3=1999999999999999 items=0 ppid=4225 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.829000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:51:28.829000 audit: BPF prog-id=34 op=UNLOAD May 10 00:51:28.829000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit: BPF prog-id=35 op=LOAD May 10 00:51:28.829000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb88ac710 a2=74 a3=ffff items=0 ppid=4225 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.829000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:51:28.829000 audit: BPF prog-id=35 op=UNLOAD May 10 00:51:28.829000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.829000 audit: BPF prog-id=36 op=LOAD May 10 00:51:28.829000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb88ac750 a2=40 a3=7ffeb88ac930 items=0 ppid=4225 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.829000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:51:28.829000 audit: BPF prog-id=36 op=UNLOAD May 10 00:51:28.947287 (udev-worker)[4132]: Network interface NamePolicy= disabled on kernel command line. May 10 00:51:28.948000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.948000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.948000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.948000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.948000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.948000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.948000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.948000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.948000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.948000 audit: BPF prog-id=37 op=LOAD May 10 00:51:28.948000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9d9e92a0 a2=98 a3=ffffffff items=0 ppid=4225 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.948000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:28.948000 audit: BPF prog-id=37 op=UNLOAD May 10 00:51:28.949000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit: BPF prog-id=38 op=LOAD May 10 00:51:28.949000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9d9e90b0 a2=74 a3=540051 items=0 ppid=4225 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:28.949000 audit: BPF prog-id=38 op=UNLOAD May 10 00:51:28.949000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit: BPF prog-id=39 op=LOAD May 10 00:51:28.949000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9d9e90e0 a2=94 a3=2 items=0 ppid=4225 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:28.949000 audit: BPF prog-id=39 op=UNLOAD May 10 00:51:28.949000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9d9e8fb0 a2=28 a3=0 items=0 ppid=4225 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9d9e8fe0 a2=28 a3=0 items=0 ppid=4225 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9d9e8ef0 a2=28 a3=0 items=0 ppid=4225 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9d9e9000 a2=28 a3=0 items=0 ppid=4225 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9d9e8fe0 a2=28 a3=0 items=0 ppid=4225 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9d9e8fd0 a2=28 a3=0 items=0 ppid=4225 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9d9e9000 a2=28 a3=0 items=0 ppid=4225 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9d9e8fe0 a2=28 a3=0 items=0 ppid=4225 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9d9e9000 a2=28 a3=0 items=0 ppid=4225 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9d9e8fd0 a2=28 a3=0 items=0 ppid=4225 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9d9e9040 a2=28 a3=0 items=0 ppid=4225 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.949000 audit: BPF prog-id=40 op=LOAD May 10 00:51:28.949000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe9d9e8eb0 a2=40 a3=0 items=0 ppid=4225 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.949000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:28.949000 audit: BPF prog-id=40 op=UNLOAD May 10 00:51:28.950000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.950000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe9d9e8ea0 a2=50 a3=2800 items=0 ppid=4225 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:28.950000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.950000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe9d9e8ea0 a2=50 a3=2800 items=0 ppid=4225 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:28.950000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.950000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.950000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.950000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.950000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.950000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.950000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.950000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.950000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.950000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.950000 audit: BPF prog-id=41 op=LOAD May 10 00:51:28.950000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe9d9e86c0 a2=94 a3=2 items=0 ppid=4225 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:28.950000 audit: BPF prog-id=41 op=UNLOAD May 10 00:51:28.950000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.950000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.950000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.950000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.950000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.950000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.950000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.950000 audit[4374]: AVC avc: denied { perfmon } for pid=4374 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.950000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.950000 audit[4374]: AVC avc: denied { bpf } for pid=4374 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.950000 audit: BPF prog-id=42 op=LOAD May 10 00:51:28.950000 audit[4374]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe9d9e87c0 a2=94 a3=30 items=0 ppid=4225 pid=4374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:28.954000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.954000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.954000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.954000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.954000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.954000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.954000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.954000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.954000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.954000 audit: BPF prog-id=43 op=LOAD May 10 00:51:28.954000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcdeb39f80 a2=98 a3=0 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.954000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:28.954000 audit: BPF prog-id=43 op=UNLOAD May 10 00:51:28.955000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.955000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.955000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.955000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.955000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.955000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.955000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.955000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.955000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.955000 audit: BPF prog-id=44 op=LOAD May 10 00:51:28.955000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcdeb39d60 a2=74 a3=540051 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.955000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:28.955000 audit: BPF prog-id=44 op=UNLOAD May 10 00:51:28.955000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.955000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.955000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.955000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.955000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.955000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.955000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.955000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.955000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.955000 audit: BPF prog-id=45 op=LOAD May 10 00:51:28.955000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcdeb39d90 a2=94 a3=2 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.955000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:28.955000 audit: BPF prog-id=45 op=UNLOAD May 10 00:51:29.176000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.176000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.176000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.176000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.176000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.176000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.176000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.176000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.176000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.176000 audit: BPF prog-id=46 op=LOAD May 10 00:51:29.176000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcdeb39c50 a2=40 a3=1 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.176000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.176000 audit: BPF prog-id=46 op=UNLOAD May 10 00:51:29.176000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.176000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcdeb39d20 a2=50 a3=7ffcdeb39e00 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.176000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.192000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.192000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcdeb39c60 a2=28 a3=0 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.192000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.192000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.192000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcdeb39c90 a2=28 a3=0 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.192000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.192000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.192000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcdeb39ba0 a2=28 a3=0 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.192000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.192000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.192000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcdeb39cb0 a2=28 a3=0 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.192000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.192000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.192000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcdeb39c90 a2=28 a3=0 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.192000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.192000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.192000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcdeb39c80 a2=28 a3=0 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.192000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.192000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.192000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcdeb39cb0 a2=28 a3=0 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.192000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.192000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.192000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcdeb39c90 a2=28 a3=0 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.192000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.192000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.192000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcdeb39cb0 a2=28 a3=0 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.192000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.192000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.192000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcdeb39c80 a2=28 a3=0 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.192000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.192000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.192000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcdeb39cf0 a2=28 a3=0 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.192000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcdeb39aa0 a2=50 a3=1 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.193000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit: BPF prog-id=47 op=LOAD May 10 00:51:29.193000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcdeb39aa0 a2=94 a3=5 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.193000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.193000 audit: BPF prog-id=47 op=UNLOAD May 10 00:51:29.193000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcdeb39b50 a2=50 a3=1 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.193000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcdeb39c70 a2=4 a3=38 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.193000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { confidentiality } for pid=4378 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:29.193000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcdeb39cc0 a2=94 a3=6 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.193000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.193000 audit[4378]: AVC avc: denied { confidentiality } for pid=4378 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:29.193000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcdeb39470 a2=94 a3=83 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.193000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.194000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.194000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.194000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.194000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.194000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.194000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.194000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.194000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.194000 audit[4378]: AVC avc: denied { perfmon } for pid=4378 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.194000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.194000 audit[4378]: AVC avc: denied { confidentiality } for pid=4378 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:29.194000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcdeb39470 a2=94 a3=83 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.194000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.194000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.194000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcdeb3aeb0 a2=10 a3=f1f00800 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.194000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.194000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.194000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcdeb3ad50 a2=10 a3=3 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.194000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.194000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.194000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcdeb3acf0 a2=10 a3=3 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.194000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.194000 audit[4378]: AVC avc: denied { bpf } for pid=4378 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:29.194000 audit[4378]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcdeb3acf0 a2=10 a3=7 items=0 ppid=4225 pid=4378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.194000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:29.204000 audit: BPF prog-id=42 op=UNLOAD May 10 00:51:29.246077 kubelet[2201]: E0510 00:51:29.245998 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:29.317000 audit[4411]: NETFILTER_CFG table=filter:111 family=2 entries=42 op=nft_register_chain pid=4411 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:29.317000 audit[4411]: SYSCALL arch=c000003e syscall=46 success=yes exit=21296 a0=3 a1=7ffc4511a8b0 a2=0 a3=7ffc4511a89c items=0 ppid=4225 pid=4411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.317000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:30.246563 kubelet[2201]: E0510 00:51:30.246518 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:30.659821 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2829947094.mount: Deactivated successfully. May 10 00:51:31.247046 kubelet[2201]: E0510 00:51:31.246974 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:32.252867 kubelet[2201]: E0510 00:51:32.252773 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:32.793583 env[1732]: time="2025-05-10T00:51:32.793522758Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:32.796027 env[1732]: time="2025-05-10T00:51:32.795987381Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:32.797937 env[1732]: time="2025-05-10T00:51:32.797902577Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:32.799872 env[1732]: time="2025-05-10T00:51:32.799818180Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:51:32.800587 env[1732]: time="2025-05-10T00:51:32.800546962Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 10 00:51:32.803628 env[1732]: time="2025-05-10T00:51:32.803562921Z" level=info msg="CreateContainer within sandbox \"31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 10 00:51:32.819672 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1223403530.mount: Deactivated successfully. May 10 00:51:32.831692 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2235020591.mount: Deactivated successfully. May 10 00:51:32.834015 env[1732]: time="2025-05-10T00:51:32.833969691Z" level=info msg="CreateContainer within sandbox \"31130409c279cc687a39eb3fd91966ec57ec91d150e9442599624297e9b34411\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"357949a15ad97f2a3872d63dd7c8bd407fb730b3aa4f99de3cfb5843f1642d4b\"" May 10 00:51:32.834654 env[1732]: time="2025-05-10T00:51:32.834623445Z" level=info msg="StartContainer for \"357949a15ad97f2a3872d63dd7c8bd407fb730b3aa4f99de3cfb5843f1642d4b\"" May 10 00:51:32.907378 env[1732]: time="2025-05-10T00:51:32.907324705Z" level=info msg="StartContainer for \"357949a15ad97f2a3872d63dd7c8bd407fb730b3aa4f99de3cfb5843f1642d4b\" returns successfully" May 10 00:51:33.253975 kubelet[2201]: E0510 00:51:33.253912 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:33.558000 audit[4462]: NETFILTER_CFG table=filter:112 family=2 entries=20 op=nft_register_rule pid=4462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:33.563185 kernel: kauditd_printk_skb: 496 callbacks suppressed May 10 00:51:33.563329 kernel: audit: type=1325 audit(1746838293.558:495): table=filter:112 family=2 entries=20 op=nft_register_rule pid=4462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:33.649522 kernel: audit: type=1300 audit(1746838293.558:495): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffff6ae2940 a2=0 a3=7ffff6ae292c items=0 ppid=2358 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:33.649603 kernel: audit: type=1327 audit(1746838293.558:495): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:33.649627 kernel: audit: type=1325 audit(1746838293.567:496): table=nat:113 family=2 entries=106 op=nft_register_chain pid=4462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:33.649649 kernel: audit: type=1300 audit(1746838293.567:496): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffff6ae2940 a2=0 a3=7ffff6ae292c items=0 ppid=2358 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:33.649678 kernel: audit: type=1327 audit(1746838293.567:496): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:33.558000 audit[4462]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffff6ae2940 a2=0 a3=7ffff6ae292c items=0 ppid=2358 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:33.558000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:33.567000 audit[4462]: NETFILTER_CFG table=nat:113 family=2 entries=106 op=nft_register_chain pid=4462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:33.567000 audit[4462]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffff6ae2940 a2=0 a3=7ffff6ae292c items=0 ppid=2358 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:33.567000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:34.254135 kubelet[2201]: E0510 00:51:34.254083 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:35.254860 kubelet[2201]: E0510 00:51:35.254803 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:36.255473 kubelet[2201]: E0510 00:51:36.255420 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:37.256302 kubelet[2201]: E0510 00:51:37.256246 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:38.256489 kubelet[2201]: E0510 00:51:38.256359 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:39.192741 kubelet[2201]: E0510 00:51:39.192693 2201 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:39.219819 env[1732]: time="2025-05-10T00:51:39.219775435Z" level=info msg="StopPodSandbox for \"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c\"" May 10 00:51:39.256713 kubelet[2201]: E0510 00:51:39.256675 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:39.855889 env[1732]: 2025-05-10 00:51:39.806 [WARNING][4496] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"531d80d8-cda2-4dc6-8483-b0f2133abf81", ResourceVersion:"1153", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.34", ContainerID:"bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb", Pod:"nginx-deployment-85f456d6dd-csqvj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali095f9b9da77", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:39.855889 env[1732]: 2025-05-10 00:51:39.806 [INFO][4496] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" May 10 00:51:39.855889 env[1732]: 2025-05-10 00:51:39.806 [INFO][4496] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" iface="eth0" netns="" May 10 00:51:39.855889 env[1732]: 2025-05-10 00:51:39.806 [INFO][4496] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" May 10 00:51:39.855889 env[1732]: 2025-05-10 00:51:39.806 [INFO][4496] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" May 10 00:51:39.855889 env[1732]: 2025-05-10 00:51:39.845 [INFO][4503] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" HandleID="k8s-pod-network.92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" Workload="172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0" May 10 00:51:39.855889 env[1732]: 2025-05-10 00:51:39.845 [INFO][4503] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:39.855889 env[1732]: 2025-05-10 00:51:39.845 [INFO][4503] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:39.855889 env[1732]: 2025-05-10 00:51:39.851 [WARNING][4503] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" HandleID="k8s-pod-network.92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" Workload="172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0" May 10 00:51:39.855889 env[1732]: 2025-05-10 00:51:39.851 [INFO][4503] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" HandleID="k8s-pod-network.92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" Workload="172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0" May 10 00:51:39.855889 env[1732]: 2025-05-10 00:51:39.853 [INFO][4503] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:39.855889 env[1732]: 2025-05-10 00:51:39.854 [INFO][4496] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" May 10 00:51:39.856620 env[1732]: time="2025-05-10T00:51:39.855916948Z" level=info msg="TearDown network for sandbox \"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c\" successfully" May 10 00:51:39.856620 env[1732]: time="2025-05-10T00:51:39.855946982Z" level=info msg="StopPodSandbox for \"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c\" returns successfully" May 10 00:51:39.856751 env[1732]: time="2025-05-10T00:51:39.856721896Z" level=info msg="RemovePodSandbox for \"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c\"" May 10 00:51:39.856791 env[1732]: time="2025-05-10T00:51:39.856755683Z" level=info msg="Forcibly stopping sandbox \"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c\"" May 10 00:51:39.926654 env[1732]: 2025-05-10 00:51:39.893 [WARNING][4521] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"531d80d8-cda2-4dc6-8483-b0f2133abf81", ResourceVersion:"1153", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.34", ContainerID:"bc3e67a4b73a8582fb4aef87241354419dca89d28c7b8ba3697205425db847eb", Pod:"nginx-deployment-85f456d6dd-csqvj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali095f9b9da77", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:39.926654 env[1732]: 2025-05-10 00:51:39.893 [INFO][4521] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" May 10 00:51:39.926654 env[1732]: 2025-05-10 00:51:39.893 [INFO][4521] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" iface="eth0" netns="" May 10 00:51:39.926654 env[1732]: 2025-05-10 00:51:39.893 [INFO][4521] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" May 10 00:51:39.926654 env[1732]: 2025-05-10 00:51:39.893 [INFO][4521] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" May 10 00:51:39.926654 env[1732]: 2025-05-10 00:51:39.915 [INFO][4528] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" HandleID="k8s-pod-network.92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" Workload="172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0" May 10 00:51:39.926654 env[1732]: 2025-05-10 00:51:39.915 [INFO][4528] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:39.926654 env[1732]: 2025-05-10 00:51:39.915 [INFO][4528] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:39.926654 env[1732]: 2025-05-10 00:51:39.922 [WARNING][4528] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" HandleID="k8s-pod-network.92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" Workload="172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0" May 10 00:51:39.926654 env[1732]: 2025-05-10 00:51:39.922 [INFO][4528] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" HandleID="k8s-pod-network.92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" Workload="172.31.22.34-k8s-nginx--deployment--85f456d6dd--csqvj-eth0" May 10 00:51:39.926654 env[1732]: 2025-05-10 00:51:39.924 [INFO][4528] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:39.926654 env[1732]: 2025-05-10 00:51:39.925 [INFO][4521] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c" May 10 00:51:39.927403 env[1732]: time="2025-05-10T00:51:39.926782832Z" level=info msg="TearDown network for sandbox \"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c\" successfully" May 10 00:51:39.930107 env[1732]: time="2025-05-10T00:51:39.930066525Z" level=info msg="RemovePodSandbox \"92bde937afffa8fe0e3d9278c2f9363ff00693bb317e47f222266e99a19ae72c\" returns successfully" May 10 00:51:39.930621 env[1732]: time="2025-05-10T00:51:39.930577753Z" level=info msg="StopPodSandbox for \"64d2400b72829c277fdc47b74c073d10768d91f5d6f4759a8b42027f75db1069\"" May 10 00:51:39.930775 env[1732]: time="2025-05-10T00:51:39.930658544Z" level=info msg="TearDown network for sandbox \"64d2400b72829c277fdc47b74c073d10768d91f5d6f4759a8b42027f75db1069\" successfully" May 10 00:51:39.930775 env[1732]: time="2025-05-10T00:51:39.930691975Z" level=info msg="StopPodSandbox for \"64d2400b72829c277fdc47b74c073d10768d91f5d6f4759a8b42027f75db1069\" returns successfully" May 10 00:51:39.931491 env[1732]: time="2025-05-10T00:51:39.930955330Z" level=info msg="RemovePodSandbox for \"64d2400b72829c277fdc47b74c073d10768d91f5d6f4759a8b42027f75db1069\"" May 10 00:51:39.931491 env[1732]: time="2025-05-10T00:51:39.930972972Z" level=info msg="Forcibly stopping sandbox \"64d2400b72829c277fdc47b74c073d10768d91f5d6f4759a8b42027f75db1069\"" May 10 00:51:39.931491 env[1732]: time="2025-05-10T00:51:39.931031633Z" level=info msg="TearDown network for sandbox \"64d2400b72829c277fdc47b74c073d10768d91f5d6f4759a8b42027f75db1069\" successfully" May 10 00:51:39.934946 env[1732]: time="2025-05-10T00:51:39.934910889Z" level=info msg="RemovePodSandbox \"64d2400b72829c277fdc47b74c073d10768d91f5d6f4759a8b42027f75db1069\" returns successfully" May 10 00:51:39.935338 env[1732]: time="2025-05-10T00:51:39.935296635Z" level=info msg="StopPodSandbox for \"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71\"" May 10 00:51:40.045688 env[1732]: 2025-05-10 00:51:39.974 [WARNING][4546] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.34-k8s-csi--node--driver--p22k7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7ca0d162-d418-45c7-a797-62fb2e6f50f3", ResourceVersion:"1126", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.34", ContainerID:"98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4", Pod:"csi-node-driver-p22k7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.113.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid911052bd54", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:40.045688 env[1732]: 2025-05-10 00:51:39.974 [INFO][4546] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" May 10 00:51:40.045688 env[1732]: 2025-05-10 00:51:39.974 [INFO][4546] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" iface="eth0" netns="" May 10 00:51:40.045688 env[1732]: 2025-05-10 00:51:39.974 [INFO][4546] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" May 10 00:51:40.045688 env[1732]: 2025-05-10 00:51:39.974 [INFO][4546] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" May 10 00:51:40.045688 env[1732]: 2025-05-10 00:51:40.032 [INFO][4553] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" HandleID="k8s-pod-network.a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" Workload="172.31.22.34-k8s-csi--node--driver--p22k7-eth0" May 10 00:51:40.045688 env[1732]: 2025-05-10 00:51:40.033 [INFO][4553] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:40.045688 env[1732]: 2025-05-10 00:51:40.033 [INFO][4553] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:40.045688 env[1732]: 2025-05-10 00:51:40.040 [WARNING][4553] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" HandleID="k8s-pod-network.a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" Workload="172.31.22.34-k8s-csi--node--driver--p22k7-eth0" May 10 00:51:40.045688 env[1732]: 2025-05-10 00:51:40.040 [INFO][4553] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" HandleID="k8s-pod-network.a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" Workload="172.31.22.34-k8s-csi--node--driver--p22k7-eth0" May 10 00:51:40.045688 env[1732]: 2025-05-10 00:51:40.042 [INFO][4553] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:40.045688 env[1732]: 2025-05-10 00:51:40.044 [INFO][4546] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" May 10 00:51:40.046305 env[1732]: time="2025-05-10T00:51:40.045706234Z" level=info msg="TearDown network for sandbox \"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71\" successfully" May 10 00:51:40.046305 env[1732]: time="2025-05-10T00:51:40.045735726Z" level=info msg="StopPodSandbox for \"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71\" returns successfully" May 10 00:51:40.046532 env[1732]: time="2025-05-10T00:51:40.046509007Z" level=info msg="RemovePodSandbox for \"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71\"" May 10 00:51:40.046652 env[1732]: time="2025-05-10T00:51:40.046607160Z" level=info msg="Forcibly stopping sandbox \"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71\"" May 10 00:51:40.119463 env[1732]: 2025-05-10 00:51:40.084 [WARNING][4573] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.34-k8s-csi--node--driver--p22k7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7ca0d162-d418-45c7-a797-62fb2e6f50f3", ResourceVersion:"1126", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.34", ContainerID:"98da09112cf8a204f8c3b4e52b0cd9f8dd4af055f24ba8eb0e06edb8f9a187a4", Pod:"csi-node-driver-p22k7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.113.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid911052bd54", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:40.119463 env[1732]: 2025-05-10 00:51:40.084 [INFO][4573] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" May 10 00:51:40.119463 env[1732]: 2025-05-10 00:51:40.084 [INFO][4573] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" iface="eth0" netns="" May 10 00:51:40.119463 env[1732]: 2025-05-10 00:51:40.084 [INFO][4573] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" May 10 00:51:40.119463 env[1732]: 2025-05-10 00:51:40.084 [INFO][4573] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" May 10 00:51:40.119463 env[1732]: 2025-05-10 00:51:40.109 [INFO][4581] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" HandleID="k8s-pod-network.a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" Workload="172.31.22.34-k8s-csi--node--driver--p22k7-eth0" May 10 00:51:40.119463 env[1732]: 2025-05-10 00:51:40.109 [INFO][4581] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:40.119463 env[1732]: 2025-05-10 00:51:40.109 [INFO][4581] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:40.119463 env[1732]: 2025-05-10 00:51:40.114 [WARNING][4581] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" HandleID="k8s-pod-network.a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" Workload="172.31.22.34-k8s-csi--node--driver--p22k7-eth0" May 10 00:51:40.119463 env[1732]: 2025-05-10 00:51:40.115 [INFO][4581] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" HandleID="k8s-pod-network.a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" Workload="172.31.22.34-k8s-csi--node--driver--p22k7-eth0" May 10 00:51:40.119463 env[1732]: 2025-05-10 00:51:40.116 [INFO][4581] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:40.119463 env[1732]: 2025-05-10 00:51:40.118 [INFO][4573] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71" May 10 00:51:40.121227 env[1732]: time="2025-05-10T00:51:40.119433662Z" level=info msg="TearDown network for sandbox \"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71\" successfully" May 10 00:51:40.124210 env[1732]: time="2025-05-10T00:51:40.124173063Z" level=info msg="RemovePodSandbox \"a509d2d9d7565b722d0cc032bc7a2f3744164609cb5867f3e62c9e2338a7eb71\" returns successfully" May 10 00:51:40.257300 kubelet[2201]: E0510 00:51:40.257251 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:41.257861 kubelet[2201]: E0510 00:51:41.257812 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:42.258982 kubelet[2201]: E0510 00:51:42.258943 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:43.260095 kubelet[2201]: E0510 00:51:43.260028 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:44.261216 kubelet[2201]: E0510 00:51:44.261160 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:45.261654 kubelet[2201]: E0510 00:51:45.261611 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:46.262251 kubelet[2201]: E0510 00:51:46.262204 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:47.262605 kubelet[2201]: E0510 00:51:47.262565 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:48.263603 kubelet[2201]: E0510 00:51:48.263550 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:49.263706 kubelet[2201]: E0510 00:51:49.263659 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:50.264936 kubelet[2201]: E0510 00:51:50.264814 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:51.265516 kubelet[2201]: E0510 00:51:51.265476 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:51.379311 systemd[1]: run-containerd-runc-k8s.io-c380e3b24541a77a157baa0ab255555b7b085a5216a6ba95cd7a24850534e2d3-runc.IBUB8q.mount: Deactivated successfully. May 10 00:51:51.448284 kubelet[2201]: I0510 00:51:51.448220 2201 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=25.031176089 podStartE2EDuration="30.448202592s" podCreationTimestamp="2025-05-10 00:51:21 +0000 UTC" firstStartedPulling="2025-05-10 00:51:27.384923296 +0000 UTC m=+48.679716086" lastFinishedPulling="2025-05-10 00:51:32.801949799 +0000 UTC m=+54.096742589" observedRunningTime="2025-05-10 00:51:33.543508098 +0000 UTC m=+54.838300889" watchObservedRunningTime="2025-05-10 00:51:51.448202592 +0000 UTC m=+72.742995384" May 10 00:51:52.266118 kubelet[2201]: E0510 00:51:52.266072 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:53.266802 kubelet[2201]: E0510 00:51:53.266757 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:54.267694 kubelet[2201]: E0510 00:51:54.267651 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:55.267951 kubelet[2201]: E0510 00:51:55.267908 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:56.268599 kubelet[2201]: E0510 00:51:56.268559 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:57.269628 kubelet[2201]: E0510 00:51:57.269574 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:58.269985 kubelet[2201]: E0510 00:51:58.269945 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:59.192121 kubelet[2201]: E0510 00:51:59.192066 2201 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:51:59.270424 kubelet[2201]: E0510 00:51:59.270340 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:52:00.270913 kubelet[2201]: E0510 00:52:00.270867 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:52:01.271987 kubelet[2201]: E0510 00:52:01.271941 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:52:01.367862 kubelet[2201]: I0510 00:52:01.367781 2201 topology_manager.go:215] "Topology Admit Handler" podUID="210b8edb-89f9-4cbf-bde4-1eafa95af887" podNamespace="default" podName="test-pod-1" May 10 00:52:01.486281 kubelet[2201]: I0510 00:52:01.486216 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-3070eaba-99a5-4965-b337-6085e8789ad5\" (UniqueName: \"kubernetes.io/nfs/210b8edb-89f9-4cbf-bde4-1eafa95af887-pvc-3070eaba-99a5-4965-b337-6085e8789ad5\") pod \"test-pod-1\" (UID: \"210b8edb-89f9-4cbf-bde4-1eafa95af887\") " pod="default/test-pod-1" May 10 00:52:01.486281 kubelet[2201]: I0510 00:52:01.486285 2201 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m9kfz\" (UniqueName: \"kubernetes.io/projected/210b8edb-89f9-4cbf-bde4-1eafa95af887-kube-api-access-m9kfz\") pod \"test-pod-1\" (UID: \"210b8edb-89f9-4cbf-bde4-1eafa95af887\") " pod="default/test-pod-1" May 10 00:52:01.635000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.643198 kernel: Failed to create system directory netfs May 10 00:52:01.643326 kernel: audit: type=1400 audit(1746838321.635:497): avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.643368 kernel: Failed to create system directory netfs May 10 00:52:01.643395 kernel: audit: type=1400 audit(1746838321.635:497): avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.635000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.647584 kernel: Failed to create system directory netfs May 10 00:52:01.647698 kernel: audit: type=1400 audit(1746838321.635:497): avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.635000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.654721 kernel: Failed to create system directory netfs May 10 00:52:01.654856 kernel: audit: type=1400 audit(1746838321.635:497): avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.635000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.635000 audit[4649]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5623d96455e0 a1=153bc a2=5623cdfd92b0 a3=5 items=0 ppid=1206 pid=4649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:01.635000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:52:01.677969 kernel: audit: type=1300 audit(1746838321.635:497): arch=c000003e syscall=175 success=yes exit=0 a0=5623d96455e0 a1=153bc a2=5623cdfd92b0 a3=5 items=0 ppid=1206 pid=4649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:01.678141 kernel: audit: type=1327 audit(1746838321.635:497): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:52:01.682000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.698086 kernel: Failed to create system directory fscache May 10 00:52:01.698133 kernel: audit: type=1400 audit(1746838321.682:498): avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.707517 kernel: Failed to create system directory fscache May 10 00:52:01.707664 kernel: audit: type=1400 audit(1746838321.682:498): avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.682000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.717223 kernel: Failed to create system directory fscache May 10 00:52:01.717371 kernel: audit: type=1400 audit(1746838321.682:498): avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.682000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.730869 kernel: Failed to create system directory fscache May 10 00:52:01.731019 kernel: audit: type=1400 audit(1746838321.682:498): avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.682000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.682000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.746895 kernel: Failed to create system directory fscache May 10 00:52:01.682000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.682000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.751466 kernel: Failed to create system directory fscache May 10 00:52:01.751584 kernel: Failed to create system directory fscache May 10 00:52:01.751616 kernel: Failed to create system directory fscache May 10 00:52:01.682000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.755335 kernel: Failed to create system directory fscache May 10 00:52:01.755548 kernel: Failed to create system directory fscache May 10 00:52:01.682000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.682000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.758876 kernel: Failed to create system directory fscache May 10 00:52:01.758989 kernel: Failed to create system directory fscache May 10 00:52:01.682000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.682000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.682000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.762139 kernel: Failed to create system directory fscache May 10 00:52:01.762242 kernel: Failed to create system directory fscache May 10 00:52:01.682000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.768905 kernel: FS-Cache: Loaded May 10 00:52:01.682000 audit[4649]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5623d985a9c0 a1=4c0fc a2=5623cdfd92b0 a3=5 items=0 ppid=1206 pid=4649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:01.682000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.827318 kernel: Failed to create system directory sunrpc May 10 00:52:01.827546 kernel: Failed to create system directory sunrpc May 10 00:52:01.827583 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.830837 kernel: Failed to create system directory sunrpc May 10 00:52:01.830992 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.833708 kernel: Failed to create system directory sunrpc May 10 00:52:01.833829 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.836463 kernel: Failed to create system directory sunrpc May 10 00:52:01.836563 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.839442 kernel: Failed to create system directory sunrpc May 10 00:52:01.839565 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.842539 kernel: Failed to create system directory sunrpc May 10 00:52:01.842654 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.844943 kernel: Failed to create system directory sunrpc May 10 00:52:01.845024 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.847581 kernel: Failed to create system directory sunrpc May 10 00:52:01.847690 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.850005 kernel: Failed to create system directory sunrpc May 10 00:52:01.850086 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.852094 kernel: Failed to create system directory sunrpc May 10 00:52:01.852174 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.854495 kernel: Failed to create system directory sunrpc May 10 00:52:01.854600 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.856601 kernel: Failed to create system directory sunrpc May 10 00:52:01.856690 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.858571 kernel: Failed to create system directory sunrpc May 10 00:52:01.858631 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.860398 kernel: Failed to create system directory sunrpc May 10 00:52:01.860465 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.862264 kernel: Failed to create system directory sunrpc May 10 00:52:01.862325 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.864511 kernel: Failed to create system directory sunrpc May 10 00:52:01.864580 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.866439 kernel: Failed to create system directory sunrpc May 10 00:52:01.866497 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.868933 kernel: Failed to create system directory sunrpc May 10 00:52:01.869023 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.870662 kernel: Failed to create system directory sunrpc May 10 00:52:01.870727 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.872703 kernel: Failed to create system directory sunrpc May 10 00:52:01.872766 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.875643 kernel: Failed to create system directory sunrpc May 10 00:52:01.875693 kernel: Failed to create system directory sunrpc May 10 00:52:01.875719 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.877490 kernel: Failed to create system directory sunrpc May 10 00:52:01.877569 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.879361 kernel: Failed to create system directory sunrpc May 10 00:52:01.879433 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.881089 kernel: Failed to create system directory sunrpc May 10 00:52:01.881149 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.882944 kernel: Failed to create system directory sunrpc May 10 00:52:01.883002 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.884715 kernel: Failed to create system directory sunrpc May 10 00:52:01.884757 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.886508 kernel: Failed to create system directory sunrpc May 10 00:52:01.886553 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.888606 kernel: Failed to create system directory sunrpc May 10 00:52:01.888672 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.889893 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.891825 kernel: Failed to create system directory sunrpc May 10 00:52:01.891933 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.894758 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.900028 kernel: Failed to create system directory sunrpc May 10 00:52:01.900092 kernel: Failed to create system directory sunrpc May 10 00:52:01.900123 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.902434 kernel: Failed to create system directory sunrpc May 10 00:52:01.902487 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.904314 kernel: Failed to create system directory sunrpc May 10 00:52:01.904415 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.906379 kernel: Failed to create system directory sunrpc May 10 00:52:01.906435 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.908233 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.909544 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.910657 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.912011 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.913273 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.914854 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.916207 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.917799 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.920585 kernel: Failed to create system directory sunrpc May 10 00:52:01.920785 kernel: Failed to create system directory sunrpc May 10 00:52:01.920817 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.921878 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.924678 kernel: Failed to create system directory sunrpc May 10 00:52:01.924739 kernel: Failed to create system directory sunrpc May 10 00:52:01.924774 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.926434 kernel: Failed to create system directory sunrpc May 10 00:52:01.926528 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.929305 kernel: Failed to create system directory sunrpc May 10 00:52:01.929394 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.931609 kernel: Failed to create system directory sunrpc May 10 00:52:01.931673 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.933829 kernel: Failed to create system directory sunrpc May 10 00:52:01.933912 kernel: Failed to create system directory sunrpc May 10 00:52:01.993481 kernel: Failed to create system directory sunrpc May 10 00:52:01.993567 kernel: Failed to create system directory sunrpc May 10 00:52:01.993659 kernel: Failed to create system directory sunrpc May 10 00:52:01.993707 kernel: Failed to create system directory sunrpc May 10 00:52:01.993738 kernel: Failed to create system directory sunrpc May 10 00:52:01.993767 kernel: Failed to create system directory sunrpc May 10 00:52:01.993799 kernel: Failed to create system directory sunrpc May 10 00:52:01.993825 kernel: Failed to create system directory sunrpc May 10 00:52:01.993878 kernel: Failed to create system directory sunrpc May 10 00:52:01.993907 kernel: Failed to create system directory sunrpc May 10 00:52:01.993944 kernel: Failed to create system directory sunrpc May 10 00:52:01.993971 kernel: Failed to create system directory sunrpc May 10 00:52:01.993999 kernel: Failed to create system directory sunrpc May 10 00:52:01.994023 kernel: Failed to create system directory sunrpc May 10 00:52:01.994110 kernel: Failed to create system directory sunrpc May 10 00:52:01.994139 kernel: Failed to create system directory sunrpc May 10 00:52:01.994169 kernel: Failed to create system directory sunrpc May 10 00:52:01.994198 kernel: Failed to create system directory sunrpc May 10 00:52:01.994222 kernel: Failed to create system directory sunrpc May 10 00:52:01.994252 kernel: Failed to create system directory sunrpc May 10 00:52:01.994277 kernel: Failed to create system directory sunrpc May 10 00:52:01.994304 kernel: Failed to create system directory sunrpc May 10 00:52:01.994329 kernel: Failed to create system directory sunrpc May 10 00:52:01.994357 kernel: Failed to create system directory sunrpc May 10 00:52:01.994385 kernel: Failed to create system directory sunrpc May 10 00:52:01.994414 kernel: Failed to create system directory sunrpc May 10 00:52:01.994441 kernel: Failed to create system directory sunrpc May 10 00:52:01.994466 kernel: Failed to create system directory sunrpc May 10 00:52:01.994487 kernel: Failed to create system directory sunrpc May 10 00:52:01.994510 kernel: Failed to create system directory sunrpc May 10 00:52:01.994534 kernel: Failed to create system directory sunrpc May 10 00:52:01.994558 kernel: Failed to create system directory sunrpc May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:01.806000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.002366 kernel: RPC: Registered named UNIX socket transport module. May 10 00:52:02.002456 kernel: RPC: Registered udp transport module. May 10 00:52:02.002500 kernel: RPC: Registered tcp transport module. May 10 00:52:02.003226 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 10 00:52:01.806000 audit[4649]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5623d98a6ad0 a1=1a814c a2=5623cdfd92b0 a3=5 items=6 ppid=1206 pid=4649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:01.806000 audit: CWD cwd="/" May 10 00:52:01.806000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:52:01.806000 audit: PATH item=1 name=(null) inode=27495 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:52:01.806000 audit: PATH item=2 name=(null) inode=27495 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:52:01.806000 audit: PATH item=3 name=(null) inode=27496 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:52:01.806000 audit: PATH item=4 name=(null) inode=27495 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:52:01.806000 audit: PATH item=5 name=(null) inode=27497 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:52:01.806000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.069370 kernel: Failed to create system directory nfs May 10 00:52:02.069475 kernel: Failed to create system directory nfs May 10 00:52:02.069506 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.071729 kernel: Failed to create system directory nfs May 10 00:52:02.071808 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.073621 kernel: Failed to create system directory nfs May 10 00:52:02.073694 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.075982 kernel: Failed to create system directory nfs May 10 00:52:02.076078 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.077688 kernel: Failed to create system directory nfs May 10 00:52:02.077788 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.079479 kernel: Failed to create system directory nfs May 10 00:52:02.079526 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.081369 kernel: Failed to create system directory nfs May 10 00:52:02.081422 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.083146 kernel: Failed to create system directory nfs May 10 00:52:02.083218 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.085074 kernel: Failed to create system directory nfs May 10 00:52:02.085156 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.086935 kernel: Failed to create system directory nfs May 10 00:52:02.086980 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.088790 kernel: Failed to create system directory nfs May 10 00:52:02.088871 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.090598 kernel: Failed to create system directory nfs May 10 00:52:02.090669 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.092679 kernel: Failed to create system directory nfs May 10 00:52:02.092754 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.094523 kernel: Failed to create system directory nfs May 10 00:52:02.094598 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.096373 kernel: Failed to create system directory nfs May 10 00:52:02.096458 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.098383 kernel: Failed to create system directory nfs May 10 00:52:02.098447 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.100208 kernel: Failed to create system directory nfs May 10 00:52:02.100269 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.101958 kernel: Failed to create system directory nfs May 10 00:52:02.102017 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.103597 kernel: Failed to create system directory nfs May 10 00:52:02.103671 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.105248 kernel: Failed to create system directory nfs May 10 00:52:02.105332 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.106131 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.106976 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.108660 kernel: Failed to create system directory nfs May 10 00:52:02.108708 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.110273 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.111340 kernel: Failed to create system directory nfs May 10 00:52:02.111401 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.112064 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.112971 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.114643 kernel: Failed to create system directory nfs May 10 00:52:02.114700 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.115503 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.117195 kernel: Failed to create system directory nfs May 10 00:52:02.117266 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.119670 kernel: Failed to create system directory nfs May 10 00:52:02.119730 kernel: Failed to create system directory nfs May 10 00:52:02.119772 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.121328 kernel: Failed to create system directory nfs May 10 00:52:02.121370 kernel: Failed to create system directory nfs May 10 00:52:02.052000 audit[4649]: AVC avc: denied { confidentiality } for pid=4649 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.052000 audit[4649]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5623d9ac7a10 a1=16eae4 a2=5623cdfd92b0 a3=5 items=0 ppid=1206 pid=4649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:02.052000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:52:02.142956 kernel: FS-Cache: Netfs 'nfs' registered for caching May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.198716 kernel: Failed to create system directory nfs4 May 10 00:52:02.198950 kernel: Failed to create system directory nfs4 May 10 00:52:02.198993 kernel: Failed to create system directory nfs4 May 10 00:52:02.199020 kernel: Failed to create system directory nfs4 May 10 00:52:02.199044 kernel: Failed to create system directory nfs4 May 10 00:52:02.199081 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.200156 kernel: Failed to create system directory nfs4 May 10 00:52:02.200211 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.202766 kernel: Failed to create system directory nfs4 May 10 00:52:02.202812 kernel: Failed to create system directory nfs4 May 10 00:52:02.202867 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.204519 kernel: Failed to create system directory nfs4 May 10 00:52:02.204611 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.206273 kernel: Failed to create system directory nfs4 May 10 00:52:02.206354 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.208056 kernel: Failed to create system directory nfs4 May 10 00:52:02.208130 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.209003 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.209914 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.211816 kernel: Failed to create system directory nfs4 May 10 00:52:02.211898 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.212657 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.213565 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.214469 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.215372 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.216439 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.218131 kernel: Failed to create system directory nfs4 May 10 00:52:02.218173 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.219042 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.219939 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.221740 kernel: Failed to create system directory nfs4 May 10 00:52:02.221818 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.222628 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.223526 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.224443 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.225333 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.226240 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.227114 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.227980 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.229716 kernel: Failed to create system directory nfs4 May 10 00:52:02.229787 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.230573 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.231434 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.232473 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.234196 kernel: Failed to create system directory nfs4 May 10 00:52:02.234275 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.235064 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.237699 kernel: Failed to create system directory nfs4 May 10 00:52:02.237786 kernel: Failed to create system directory nfs4 May 10 00:52:02.237821 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.238554 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.239426 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.240297 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.241176 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.242046 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.243955 kernel: Failed to create system directory nfs4 May 10 00:52:02.244027 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.245923 kernel: Failed to create system directory nfs4 May 10 00:52:02.245984 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.247497 kernel: Failed to create system directory nfs4 May 10 00:52:02.247573 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.254564 kernel: Failed to create system directory nfs4 May 10 00:52:02.254670 kernel: Failed to create system directory nfs4 May 10 00:52:02.254696 kernel: Failed to create system directory nfs4 May 10 00:52:02.254744 kernel: Failed to create system directory nfs4 May 10 00:52:02.254769 kernel: Failed to create system directory nfs4 May 10 00:52:02.254792 kernel: Failed to create system directory nfs4 May 10 00:52:02.254820 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.255192 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.256037 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.257709 kernel: Failed to create system directory nfs4 May 10 00:52:02.257752 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.258584 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.259400 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.260263 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.261137 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.262016 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.263710 kernel: Failed to create system directory nfs4 May 10 00:52:02.263771 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.265409 kernel: Failed to create system directory nfs4 May 10 00:52:02.265454 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.266264 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.267131 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.268004 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.268925 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.270619 kernel: Failed to create system directory nfs4 May 10 00:52:02.270702 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.271503 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.272605 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.272732 kubelet[2201]: E0510 00:52:02.272540 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:52:02.273397 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.274271 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.275198 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.276532 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.277028 kernel: Failed to create system directory nfs4 May 10 00:52:02.175000 audit[4654]: AVC avc: denied { confidentiality } for pid=4654 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.404625 kernel: NFS: Registering the id_resolver key type May 10 00:52:02.404761 kernel: Key type id_resolver registered May 10 00:52:02.404813 kernel: Key type id_legacy registered May 10 00:52:02.175000 audit[4654]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fee8b782010 a1=209404 a2=561855c7a2b0 a3=5 items=0 ppid=1206 pid=4654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:02.175000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.422435 kernel: Failed to create system directory rpcgss May 10 00:52:02.422498 kernel: Failed to create system directory rpcgss May 10 00:52:02.422525 kernel: Failed to create system directory rpcgss May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.424287 kernel: Failed to create system directory rpcgss May 10 00:52:02.424338 kernel: Failed to create system directory rpcgss May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.426174 kernel: Failed to create system directory rpcgss May 10 00:52:02.426230 kernel: Failed to create system directory rpcgss May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.428003 kernel: Failed to create system directory rpcgss May 10 00:52:02.428077 kernel: Failed to create system directory rpcgss May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.429864 kernel: Failed to create system directory rpcgss May 10 00:52:02.429913 kernel: Failed to create system directory rpcgss May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.431699 kernel: Failed to create system directory rpcgss May 10 00:52:02.431743 kernel: Failed to create system directory rpcgss May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.433566 kernel: Failed to create system directory rpcgss May 10 00:52:02.433615 kernel: Failed to create system directory rpcgss May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.435419 kernel: Failed to create system directory rpcgss May 10 00:52:02.435469 kernel: Failed to create system directory rpcgss May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.437309 kernel: Failed to create system directory rpcgss May 10 00:52:02.437385 kernel: Failed to create system directory rpcgss May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.439168 kernel: Failed to create system directory rpcgss May 10 00:52:02.439231 kernel: Failed to create system directory rpcgss May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.441023 kernel: Failed to create system directory rpcgss May 10 00:52:02.441089 kernel: Failed to create system directory rpcgss May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.442932 kernel: Failed to create system directory rpcgss May 10 00:52:02.442987 kernel: Failed to create system directory rpcgss May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.416000 audit[4655]: AVC avc: denied { confidentiality } for pid=4655 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:02.444873 kernel: Failed to create system directory rpcgss May 10 00:52:02.416000 audit[4655]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f406b98e010 a1=70b64 a2=55d8223b32b0 a3=5 items=0 ppid=1206 pid=4655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:02.416000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 10 00:52:02.476068 nfsidmap[4662]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' May 10 00:52:02.483655 nfsidmap[4663]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' May 10 00:52:02.495000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2877 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:52:02.495000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2877 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:52:02.495000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2877 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:52:02.495000 audit[1942]: AVC avc: denied { watch_reads } for pid=1942 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2877 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:52:02.495000 audit[1942]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=55baa99d5980 a2=10 a3=de40fc79431f04e6 items=0 ppid=1 pid=1942 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:02.495000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 10 00:52:02.496000 audit[1942]: AVC avc: denied { watch_reads } for pid=1942 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2877 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:52:02.496000 audit[1942]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=55baa99d5980 a2=10 a3=de40fc79431f04e6 items=0 ppid=1 pid=1942 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:02.496000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 10 00:52:02.496000 audit[1942]: AVC avc: denied { watch_reads } for pid=1942 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2877 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:52:02.496000 audit[1942]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=55baa99d5980 a2=10 a3=de40fc79431f04e6 items=0 ppid=1 pid=1942 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:02.496000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 10 00:52:02.576649 env[1732]: time="2025-05-10T00:52:02.576592111Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:210b8edb-89f9-4cbf-bde4-1eafa95af887,Namespace:default,Attempt:0,}" May 10 00:52:02.763437 (udev-worker)[4659]: Network interface NamePolicy= disabled on kernel command line. May 10 00:52:02.764941 systemd-networkd[1413]: cali5ec59c6bf6e: Link UP May 10 00:52:02.767837 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:52:02.768047 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 10 00:52:02.768065 systemd-networkd[1413]: cali5ec59c6bf6e: Gained carrier May 10 00:52:02.781947 env[1732]: 2025-05-10 00:52:02.640 [INFO][4664] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.34-k8s-test--pod--1-eth0 default 210b8edb-89f9-4cbf-bde4-1eafa95af887 1462 0 2025-05-10 00:51:23 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.22.34 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.34-k8s-test--pod--1-" May 10 00:52:02.781947 env[1732]: 2025-05-10 00:52:02.640 [INFO][4664] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.34-k8s-test--pod--1-eth0" May 10 00:52:02.781947 env[1732]: 2025-05-10 00:52:02.683 [INFO][4676] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3" HandleID="k8s-pod-network.945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3" Workload="172.31.22.34-k8s-test--pod--1-eth0" May 10 00:52:02.781947 env[1732]: 2025-05-10 00:52:02.703 [INFO][4676] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3" HandleID="k8s-pod-network.945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3" Workload="172.31.22.34-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001fe260), Attrs:map[string]string{"namespace":"default", "node":"172.31.22.34", "pod":"test-pod-1", "timestamp":"2025-05-10 00:52:02.683421181 +0000 UTC"}, Hostname:"172.31.22.34", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:52:02.781947 env[1732]: 2025-05-10 00:52:02.703 [INFO][4676] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:52:02.781947 env[1732]: 2025-05-10 00:52:02.703 [INFO][4676] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:52:02.781947 env[1732]: 2025-05-10 00:52:02.703 [INFO][4676] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.34' May 10 00:52:02.781947 env[1732]: 2025-05-10 00:52:02.706 [INFO][4676] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3" host="172.31.22.34" May 10 00:52:02.781947 env[1732]: 2025-05-10 00:52:02.715 [INFO][4676] ipam/ipam.go 372: Looking up existing affinities for host host="172.31.22.34" May 10 00:52:02.781947 env[1732]: 2025-05-10 00:52:02.721 [INFO][4676] ipam/ipam.go 489: Trying affinity for 192.168.113.64/26 host="172.31.22.34" May 10 00:52:02.781947 env[1732]: 2025-05-10 00:52:02.723 [INFO][4676] ipam/ipam.go 155: Attempting to load block cidr=192.168.113.64/26 host="172.31.22.34" May 10 00:52:02.781947 env[1732]: 2025-05-10 00:52:02.726 [INFO][4676] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.113.64/26 host="172.31.22.34" May 10 00:52:02.781947 env[1732]: 2025-05-10 00:52:02.726 [INFO][4676] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.113.64/26 handle="k8s-pod-network.945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3" host="172.31.22.34" May 10 00:52:02.781947 env[1732]: 2025-05-10 00:52:02.729 [INFO][4676] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3 May 10 00:52:02.781947 env[1732]: 2025-05-10 00:52:02.738 [INFO][4676] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.113.64/26 handle="k8s-pod-network.945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3" host="172.31.22.34" May 10 00:52:02.781947 env[1732]: 2025-05-10 00:52:02.759 [INFO][4676] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.113.69/26] block=192.168.113.64/26 handle="k8s-pod-network.945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3" host="172.31.22.34" May 10 00:52:02.781947 env[1732]: 2025-05-10 00:52:02.759 [INFO][4676] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.113.69/26] handle="k8s-pod-network.945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3" host="172.31.22.34" May 10 00:52:02.781947 env[1732]: 2025-05-10 00:52:02.759 [INFO][4676] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:52:02.781947 env[1732]: 2025-05-10 00:52:02.759 [INFO][4676] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.113.69/26] IPv6=[] ContainerID="945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3" HandleID="k8s-pod-network.945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3" Workload="172.31.22.34-k8s-test--pod--1-eth0" May 10 00:52:02.781947 env[1732]: 2025-05-10 00:52:02.761 [INFO][4664] cni-plugin/k8s.go 386: Populated endpoint ContainerID="945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.34-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.34-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"210b8edb-89f9-4cbf-bde4-1eafa95af887", ResourceVersion:"1462", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 51, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.34", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:52:02.782984 env[1732]: 2025-05-10 00:52:02.761 [INFO][4664] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.113.69/32] ContainerID="945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.34-k8s-test--pod--1-eth0" May 10 00:52:02.782984 env[1732]: 2025-05-10 00:52:02.761 [INFO][4664] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.34-k8s-test--pod--1-eth0" May 10 00:52:02.782984 env[1732]: 2025-05-10 00:52:02.769 [INFO][4664] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.34-k8s-test--pod--1-eth0" May 10 00:52:02.782984 env[1732]: 2025-05-10 00:52:02.769 [INFO][4664] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.34-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.34-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"210b8edb-89f9-4cbf-bde4-1eafa95af887", ResourceVersion:"1462", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 51, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.34", ContainerID:"945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.113.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"1a:4a:70:ab:92:c7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:52:02.782984 env[1732]: 2025-05-10 00:52:02.779 [INFO][4664] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.34-k8s-test--pod--1-eth0" May 10 00:52:02.791000 audit[4696]: NETFILTER_CFG table=filter:114 family=2 entries=42 op=nft_register_chain pid=4696 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:52:02.791000 audit[4696]: SYSCALL arch=c000003e syscall=46 success=yes exit=20588 a0=3 a1=7ffd8a321300 a2=0 a3=7ffd8a3212ec items=0 ppid=4225 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:02.791000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:52:02.798033 env[1732]: time="2025-05-10T00:52:02.797944280Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:52:02.798206 env[1732]: time="2025-05-10T00:52:02.798010158Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:52:02.798206 env[1732]: time="2025-05-10T00:52:02.798023355Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:52:02.798468 env[1732]: time="2025-05-10T00:52:02.798397431Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3 pid=4704 runtime=io.containerd.runc.v2 May 10 00:52:02.864497 env[1732]: time="2025-05-10T00:52:02.864451282Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:210b8edb-89f9-4cbf-bde4-1eafa95af887,Namespace:default,Attempt:0,} returns sandbox id \"945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3\"" May 10 00:52:02.867222 env[1732]: time="2025-05-10T00:52:02.867177474Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 10 00:52:03.155110 env[1732]: time="2025-05-10T00:52:03.154980210Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:52:03.157884 env[1732]: time="2025-05-10T00:52:03.157823247Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:52:03.159815 env[1732]: time="2025-05-10T00:52:03.159776566Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:52:03.161916 env[1732]: time="2025-05-10T00:52:03.161883096Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:52:03.162569 env[1732]: time="2025-05-10T00:52:03.162532041Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 10 00:52:03.165224 env[1732]: time="2025-05-10T00:52:03.165190603Z" level=info msg="CreateContainer within sandbox \"945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 10 00:52:03.180277 env[1732]: time="2025-05-10T00:52:03.180212270Z" level=info msg="CreateContainer within sandbox \"945fad12e75ffdc0b2fd6e95bb056b8d5f3f133225acbd398a227cdc9c99c9f3\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"41637860d5c33f76bb7f9bbb4c9e617193cabc2764d329319dc890e5a1b0c049\"" May 10 00:52:03.181066 env[1732]: time="2025-05-10T00:52:03.181022076Z" level=info msg="StartContainer for \"41637860d5c33f76bb7f9bbb4c9e617193cabc2764d329319dc890e5a1b0c049\"" May 10 00:52:03.249348 env[1732]: time="2025-05-10T00:52:03.249286446Z" level=info msg="StartContainer for \"41637860d5c33f76bb7f9bbb4c9e617193cabc2764d329319dc890e5a1b0c049\" returns successfully" May 10 00:52:03.273514 kubelet[2201]: E0510 00:52:03.273445 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:52:04.273789 kubelet[2201]: E0510 00:52:04.273735 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:52:04.512102 systemd-networkd[1413]: cali5ec59c6bf6e: Gained IPv6LL May 10 00:52:05.274488 kubelet[2201]: E0510 00:52:05.274438 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:52:06.275227 kubelet[2201]: E0510 00:52:06.275173 2201 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"