May 10 00:44:57.100134 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 9 23:12:23 -00 2025 May 10 00:44:57.100162 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:44:57.100171 kernel: BIOS-provided physical RAM map: May 10 00:44:57.100177 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 10 00:44:57.100184 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved May 10 00:44:57.100191 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable May 10 00:44:57.100201 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved May 10 00:44:57.100207 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data May 10 00:44:57.100212 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS May 10 00:44:57.100219 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable May 10 00:44:57.100227 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable May 10 00:44:57.100233 kernel: printk: bootconsole [earlyser0] enabled May 10 00:44:57.100239 kernel: NX (Execute Disable) protection: active May 10 00:44:57.100245 kernel: efi: EFI v2.70 by Microsoft May 10 00:44:57.100257 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 May 10 00:44:57.100265 kernel: random: crng init done May 10 00:44:57.100271 kernel: SMBIOS 3.1.0 present. May 10 00:44:57.100278 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 May 10 00:44:57.100286 kernel: Hypervisor detected: Microsoft Hyper-V May 10 00:44:57.100293 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 May 10 00:44:57.100299 kernel: Hyper-V Host Build:20348-10.0-1-0.1827 May 10 00:44:57.100305 kernel: Hyper-V: Nested features: 0x1e0101 May 10 00:44:57.100314 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 May 10 00:44:57.100320 kernel: Hyper-V: Using hypercall for remote TLB flush May 10 00:44:57.100329 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns May 10 00:44:57.100336 kernel: tsc: Marking TSC unstable due to running on Hyper-V May 10 00:44:57.100343 kernel: tsc: Detected 2593.907 MHz processor May 10 00:44:57.100351 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 10 00:44:57.100359 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 10 00:44:57.100365 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 May 10 00:44:57.100372 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 10 00:44:57.100378 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved May 10 00:44:57.100389 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 May 10 00:44:57.100406 kernel: Using GB pages for direct mapping May 10 00:44:57.100414 kernel: Secure boot disabled May 10 00:44:57.100420 kernel: ACPI: Early table checksum verification disabled May 10 00:44:57.100427 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) May 10 00:44:57.100433 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:44:57.100439 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:44:57.100446 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) May 10 00:44:57.100458 kernel: ACPI: FACS 0x000000003FFFE000 000040 May 10 00:44:57.100468 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:44:57.100476 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:44:57.100485 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:44:57.100492 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:44:57.100499 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:44:57.100511 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:44:57.100519 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:44:57.100528 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] May 10 00:44:57.100535 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] May 10 00:44:57.100544 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] May 10 00:44:57.100552 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] May 10 00:44:57.100562 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] May 10 00:44:57.100569 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] May 10 00:44:57.100577 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] May 10 00:44:57.100585 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] May 10 00:44:57.100594 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] May 10 00:44:57.100602 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] May 10 00:44:57.100611 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 10 00:44:57.100618 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 10 00:44:57.100626 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug May 10 00:44:57.100635 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug May 10 00:44:57.100642 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug May 10 00:44:57.100654 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug May 10 00:44:57.100661 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug May 10 00:44:57.100668 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug May 10 00:44:57.100677 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug May 10 00:44:57.100685 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug May 10 00:44:57.100694 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug May 10 00:44:57.100701 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug May 10 00:44:57.100708 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug May 10 00:44:57.100716 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug May 10 00:44:57.100728 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug May 10 00:44:57.100738 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug May 10 00:44:57.100745 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug May 10 00:44:57.100752 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug May 10 00:44:57.100761 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] May 10 00:44:57.100769 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] May 10 00:44:57.100777 kernel: Zone ranges: May 10 00:44:57.100786 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 10 00:44:57.100793 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 10 00:44:57.100805 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] May 10 00:44:57.100811 kernel: Movable zone start for each node May 10 00:44:57.100822 kernel: Early memory node ranges May 10 00:44:57.100829 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 10 00:44:57.100835 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] May 10 00:44:57.100845 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] May 10 00:44:57.100852 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] May 10 00:44:57.100859 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] May 10 00:44:57.100866 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 00:44:57.100878 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 10 00:44:57.100885 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges May 10 00:44:57.100892 kernel: ACPI: PM-Timer IO Port: 0x408 May 10 00:44:57.100900 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) May 10 00:44:57.100908 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 May 10 00:44:57.100916 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 10 00:44:57.100926 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 10 00:44:57.100932 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 May 10 00:44:57.100940 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 10 00:44:57.100951 kernel: [mem 0x40000000-0xffffffff] available for PCI devices May 10 00:44:57.100960 kernel: Booting paravirtualized kernel on Hyper-V May 10 00:44:57.100969 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 10 00:44:57.100976 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 10 00:44:57.100983 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 10 00:44:57.100991 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 10 00:44:57.100999 kernel: pcpu-alloc: [0] 0 1 May 10 00:44:57.101008 kernel: Hyper-V: PV spinlocks enabled May 10 00:44:57.101016 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 10 00:44:57.101025 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 May 10 00:44:57.101035 kernel: Policy zone: Normal May 10 00:44:57.101044 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:44:57.101054 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 10 00:44:57.101061 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) May 10 00:44:57.101067 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 10 00:44:57.101078 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 10 00:44:57.101085 kernel: Memory: 8079144K/8387460K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 308056K reserved, 0K cma-reserved) May 10 00:44:57.101097 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 10 00:44:57.101104 kernel: ftrace: allocating 34584 entries in 136 pages May 10 00:44:57.101118 kernel: ftrace: allocated 136 pages with 2 groups May 10 00:44:57.101131 kernel: rcu: Hierarchical RCU implementation. May 10 00:44:57.101140 kernel: rcu: RCU event tracing is enabled. May 10 00:44:57.101148 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 10 00:44:57.101158 kernel: Rude variant of Tasks RCU enabled. May 10 00:44:57.101165 kernel: Tracing variant of Tasks RCU enabled. May 10 00:44:57.101173 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 10 00:44:57.101183 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 10 00:44:57.101192 kernel: Using NULL legacy PIC May 10 00:44:57.101203 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 May 10 00:44:57.101210 kernel: Console: colour dummy device 80x25 May 10 00:44:57.101220 kernel: printk: console [tty1] enabled May 10 00:44:57.101228 kernel: printk: console [ttyS0] enabled May 10 00:44:57.101235 kernel: printk: bootconsole [earlyser0] disabled May 10 00:44:57.101247 kernel: ACPI: Core revision 20210730 May 10 00:44:57.101255 kernel: Failed to register legacy timer interrupt May 10 00:44:57.101262 kernel: APIC: Switch to symmetric I/O mode setup May 10 00:44:57.101271 kernel: Hyper-V: Using IPI hypercalls May 10 00:44:57.101280 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593907) May 10 00:44:57.101291 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 10 00:44:57.101299 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 10 00:44:57.101306 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 10 00:44:57.101316 kernel: Spectre V2 : Mitigation: Retpolines May 10 00:44:57.101324 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 10 00:44:57.101335 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! May 10 00:44:57.101343 kernel: RETBleed: Vulnerable May 10 00:44:57.101350 kernel: Speculative Store Bypass: Vulnerable May 10 00:44:57.101360 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode May 10 00:44:57.101369 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 10 00:44:57.101378 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 10 00:44:57.101385 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 10 00:44:57.101394 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 10 00:44:57.101429 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' May 10 00:44:57.101440 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' May 10 00:44:57.101449 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' May 10 00:44:57.101457 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 10 00:44:57.101464 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 May 10 00:44:57.101471 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 May 10 00:44:57.101479 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 May 10 00:44:57.101493 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. May 10 00:44:57.101506 kernel: Freeing SMP alternatives memory: 32K May 10 00:44:57.101520 kernel: pid_max: default: 32768 minimum: 301 May 10 00:44:57.101529 kernel: LSM: Security Framework initializing May 10 00:44:57.101536 kernel: SELinux: Initializing. May 10 00:44:57.101549 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 10 00:44:57.101563 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 10 00:44:57.101583 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) May 10 00:44:57.101598 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. May 10 00:44:57.101612 kernel: signal: max sigframe size: 3632 May 10 00:44:57.101625 kernel: rcu: Hierarchical SRCU implementation. May 10 00:44:57.101634 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 10 00:44:57.101641 kernel: smp: Bringing up secondary CPUs ... May 10 00:44:57.101654 kernel: x86: Booting SMP configuration: May 10 00:44:57.101669 kernel: .... node #0, CPUs: #1 May 10 00:44:57.101684 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. May 10 00:44:57.101701 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. May 10 00:44:57.101717 kernel: smp: Brought up 1 node, 2 CPUs May 10 00:44:57.101730 kernel: smpboot: Max logical packages: 1 May 10 00:44:57.101738 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) May 10 00:44:57.101746 kernel: devtmpfs: initialized May 10 00:44:57.101760 kernel: x86/mm: Memory block size: 128MB May 10 00:44:57.101774 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) May 10 00:44:57.101788 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 10 00:44:57.101800 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 10 00:44:57.101810 kernel: pinctrl core: initialized pinctrl subsystem May 10 00:44:57.101822 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 10 00:44:57.101836 kernel: audit: initializing netlink subsys (disabled) May 10 00:44:57.101850 kernel: audit: type=2000 audit(1746837895.024:1): state=initialized audit_enabled=0 res=1 May 10 00:44:57.101864 kernel: thermal_sys: Registered thermal governor 'step_wise' May 10 00:44:57.101874 kernel: thermal_sys: Registered thermal governor 'user_space' May 10 00:44:57.101882 kernel: cpuidle: using governor menu May 10 00:44:57.101893 kernel: ACPI: bus type PCI registered May 10 00:44:57.101907 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 10 00:44:57.101926 kernel: dca service started, version 1.12.1 May 10 00:44:57.101937 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 10 00:44:57.101944 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 10 00:44:57.101954 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 10 00:44:57.101969 kernel: ACPI: Added _OSI(Module Device) May 10 00:44:57.101984 kernel: ACPI: Added _OSI(Processor Device) May 10 00:44:57.101999 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 10 00:44:57.102012 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 10 00:44:57.102021 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 10 00:44:57.102030 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 10 00:44:57.102045 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 10 00:44:57.102059 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 10 00:44:57.102073 kernel: ACPI: Interpreter enabled May 10 00:44:57.102085 kernel: ACPI: PM: (supports S0 S5) May 10 00:44:57.102093 kernel: ACPI: Using IOAPIC for interrupt routing May 10 00:44:57.102104 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 10 00:44:57.102118 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F May 10 00:44:57.102133 kernel: iommu: Default domain type: Translated May 10 00:44:57.102151 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 10 00:44:57.102166 kernel: vgaarb: loaded May 10 00:44:57.102181 kernel: pps_core: LinuxPPS API ver. 1 registered May 10 00:44:57.102194 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 10 00:44:57.102201 kernel: PTP clock support registered May 10 00:44:57.102211 kernel: Registered efivars operations May 10 00:44:57.102225 kernel: PCI: Using ACPI for IRQ routing May 10 00:44:57.102238 kernel: PCI: System does not support PCI May 10 00:44:57.102252 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page May 10 00:44:57.102268 kernel: VFS: Disk quotas dquot_6.6.0 May 10 00:44:57.102282 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 10 00:44:57.102296 kernel: pnp: PnP ACPI init May 10 00:44:57.102310 kernel: pnp: PnP ACPI: found 3 devices May 10 00:44:57.102324 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 10 00:44:57.102337 kernel: NET: Registered PF_INET protocol family May 10 00:44:57.102346 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 10 00:44:57.102354 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) May 10 00:44:57.102362 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 10 00:44:57.102371 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) May 10 00:44:57.102383 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) May 10 00:44:57.102406 kernel: TCP: Hash tables configured (established 65536 bind 65536) May 10 00:44:57.102419 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) May 10 00:44:57.102433 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) May 10 00:44:57.102446 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 10 00:44:57.102454 kernel: NET: Registered PF_XDP protocol family May 10 00:44:57.102461 kernel: PCI: CLS 0 bytes, default 64 May 10 00:44:57.102473 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 10 00:44:57.102492 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) May 10 00:44:57.102506 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 10 00:44:57.102518 kernel: Initialise system trusted keyrings May 10 00:44:57.102526 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 May 10 00:44:57.102534 kernel: Key type asymmetric registered May 10 00:44:57.102548 kernel: Asymmetric key parser 'x509' registered May 10 00:44:57.102562 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 10 00:44:57.102577 kernel: io scheduler mq-deadline registered May 10 00:44:57.102590 kernel: io scheduler kyber registered May 10 00:44:57.102600 kernel: io scheduler bfq registered May 10 00:44:57.102608 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 10 00:44:57.102624 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 10 00:44:57.102638 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 10 00:44:57.102653 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A May 10 00:44:57.102667 kernel: i8042: PNP: No PS/2 controller found. May 10 00:44:57.102843 kernel: rtc_cmos 00:02: registered as rtc0 May 10 00:44:57.102953 kernel: rtc_cmos 00:02: setting system clock to 2025-05-10T00:44:56 UTC (1746837896) May 10 00:44:57.103060 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram May 10 00:44:57.103078 kernel: intel_pstate: CPU model not supported May 10 00:44:57.103090 kernel: efifb: probing for efifb May 10 00:44:57.103097 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k May 10 00:44:57.103111 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 May 10 00:44:57.103125 kernel: efifb: scrolling: redraw May 10 00:44:57.103137 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 10 00:44:57.103144 kernel: Console: switching to colour frame buffer device 128x48 May 10 00:44:57.103159 kernel: fb0: EFI VGA frame buffer device May 10 00:44:57.103173 kernel: pstore: Registered efi as persistent store backend May 10 00:44:57.103186 kernel: NET: Registered PF_INET6 protocol family May 10 00:44:57.103195 kernel: Segment Routing with IPv6 May 10 00:44:57.103206 kernel: In-situ OAM (IOAM) with IPv6 May 10 00:44:57.103220 kernel: NET: Registered PF_PACKET protocol family May 10 00:44:57.103231 kernel: Key type dns_resolver registered May 10 00:44:57.103243 kernel: IPI shorthand broadcast: enabled May 10 00:44:57.103254 kernel: sched_clock: Marking stable (958605200, 27859700)->(1246299200, -259834300) May 10 00:44:57.103265 kernel: registered taskstats version 1 May 10 00:44:57.103279 kernel: Loading compiled-in X.509 certificates May 10 00:44:57.103290 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 0c62a22cd9157131d2e97d5a2e1bd9023e187117' May 10 00:44:57.103303 kernel: Key type .fscrypt registered May 10 00:44:57.103315 kernel: Key type fscrypt-provisioning registered May 10 00:44:57.103327 kernel: pstore: Using crash dump compression: deflate May 10 00:44:57.103340 kernel: ima: No TPM chip found, activating TPM-bypass! May 10 00:44:57.103352 kernel: ima: Allocated hash algorithm: sha1 May 10 00:44:57.103365 kernel: ima: No architecture policies found May 10 00:44:57.103379 kernel: clk: Disabling unused clocks May 10 00:44:57.103392 kernel: Freeing unused kernel image (initmem) memory: 47456K May 10 00:44:57.103430 kernel: Write protecting the kernel read-only data: 28672k May 10 00:44:57.103442 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 10 00:44:57.103455 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 10 00:44:57.103467 kernel: Run /init as init process May 10 00:44:57.103480 kernel: with arguments: May 10 00:44:57.103492 kernel: /init May 10 00:44:57.103505 kernel: with environment: May 10 00:44:57.103520 kernel: HOME=/ May 10 00:44:57.103532 kernel: TERM=linux May 10 00:44:57.103544 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 10 00:44:57.103559 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:44:57.103575 systemd[1]: Detected virtualization microsoft. May 10 00:44:57.103588 systemd[1]: Detected architecture x86-64. May 10 00:44:57.103601 systemd[1]: Running in initrd. May 10 00:44:57.103613 systemd[1]: No hostname configured, using default hostname. May 10 00:44:57.103629 systemd[1]: Hostname set to . May 10 00:44:57.103642 systemd[1]: Initializing machine ID from random generator. May 10 00:44:57.103655 systemd[1]: Queued start job for default target initrd.target. May 10 00:44:57.103668 systemd[1]: Started systemd-ask-password-console.path. May 10 00:44:57.103681 systemd[1]: Reached target cryptsetup.target. May 10 00:44:57.103694 systemd[1]: Reached target paths.target. May 10 00:44:57.103707 systemd[1]: Reached target slices.target. May 10 00:44:57.103720 systemd[1]: Reached target swap.target. May 10 00:44:57.103735 systemd[1]: Reached target timers.target. May 10 00:44:57.103749 systemd[1]: Listening on iscsid.socket. May 10 00:44:57.103762 systemd[1]: Listening on iscsiuio.socket. May 10 00:44:57.103775 systemd[1]: Listening on systemd-journald-audit.socket. May 10 00:44:57.103789 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 00:44:57.103802 systemd[1]: Listening on systemd-journald.socket. May 10 00:44:57.103815 systemd[1]: Listening on systemd-networkd.socket. May 10 00:44:57.103828 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:44:57.103843 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:44:57.103856 systemd[1]: Reached target sockets.target. May 10 00:44:57.103869 systemd[1]: Starting kmod-static-nodes.service... May 10 00:44:57.103882 systemd[1]: Finished network-cleanup.service. May 10 00:44:57.103895 systemd[1]: Starting systemd-fsck-usr.service... May 10 00:44:57.103908 systemd[1]: Starting systemd-journald.service... May 10 00:44:57.103922 systemd[1]: Starting systemd-modules-load.service... May 10 00:44:57.103934 systemd[1]: Starting systemd-resolved.service... May 10 00:44:57.103947 systemd[1]: Starting systemd-vconsole-setup.service... May 10 00:44:57.103967 systemd-journald[183]: Journal started May 10 00:44:57.104027 systemd-journald[183]: Runtime Journal (/run/log/journal/3edeee5895c4450a976f8ab0ac71b5df) is 8.0M, max 159.0M, 151.0M free. May 10 00:44:57.105996 systemd-modules-load[184]: Inserted module 'overlay' May 10 00:44:57.123421 systemd[1]: Started systemd-journald.service. May 10 00:44:57.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:57.126931 systemd[1]: Finished kmod-static-nodes.service. May 10 00:44:57.151934 kernel: audit: type=1130 audit(1746837897.126:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:57.148347 systemd[1]: Finished systemd-fsck-usr.service. May 10 00:44:57.152405 systemd[1]: Finished systemd-vconsole-setup.service. May 10 00:44:57.157099 systemd[1]: Starting dracut-cmdline-ask.service... May 10 00:44:57.178639 kernel: audit: type=1130 audit(1746837897.147:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:57.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:57.164907 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:44:57.189109 systemd-resolved[185]: Positive Trust Anchors: May 10 00:44:57.191605 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:44:57.221210 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 10 00:44:57.221251 kernel: audit: type=1130 audit(1746837897.151:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:57.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:57.194219 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:44:57.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:57.194258 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:44:57.255990 kernel: audit: type=1130 audit(1746837897.155:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:57.256024 kernel: Bridge firewalling registered May 10 00:44:57.197008 systemd-resolved[185]: Defaulting to hostname 'linux'. May 10 00:44:57.197856 systemd[1]: Started systemd-resolved.service. May 10 00:44:57.256229 systemd[1]: Finished dracut-cmdline-ask.service. May 10 00:44:57.258388 systemd-modules-load[184]: Inserted module 'br_netfilter' May 10 00:44:57.260565 systemd[1]: Reached target nss-lookup.target. May 10 00:44:57.266986 systemd[1]: Starting dracut-cmdline.service... May 10 00:44:57.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:57.286482 dracut-cmdline[200]: dracut-dracut-053 May 10 00:44:57.296034 kernel: audit: type=1130 audit(1746837897.193:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:57.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:57.312359 kernel: audit: type=1130 audit(1746837897.255:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:57.312442 kernel: SCSI subsystem initialized May 10 00:44:57.312454 kernel: audit: type=1130 audit(1746837897.260:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:57.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:57.312506 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:44:57.367726 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 10 00:44:57.367793 kernel: device-mapper: uevent: version 1.0.3 May 10 00:44:57.367810 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 10 00:44:57.377526 systemd-modules-load[184]: Inserted module 'dm_multipath' May 10 00:44:57.380783 systemd[1]: Finished systemd-modules-load.service. May 10 00:44:57.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:57.386375 systemd[1]: Starting systemd-sysctl.service... May 10 00:44:57.402140 kernel: audit: type=1130 audit(1746837897.384:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:57.409108 systemd[1]: Finished systemd-sysctl.service. May 10 00:44:57.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:57.435739 kernel: Loading iSCSI transport class v2.0-870. May 10 00:44:57.435779 kernel: audit: type=1130 audit(1746837897.410:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:57.456416 kernel: iscsi: registered transport (tcp) May 10 00:44:57.482929 kernel: iscsi: registered transport (qla4xxx) May 10 00:44:57.483007 kernel: QLogic iSCSI HBA Driver May 10 00:44:57.512352 systemd[1]: Finished dracut-cmdline.service. May 10 00:44:57.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:57.517566 systemd[1]: Starting dracut-pre-udev.service... May 10 00:44:57.568430 kernel: raid6: avx512x4 gen() 18382 MB/s May 10 00:44:57.588421 kernel: raid6: avx512x4 xor() 7445 MB/s May 10 00:44:57.609415 kernel: raid6: avx512x2 gen() 18243 MB/s May 10 00:44:57.628408 kernel: raid6: avx512x2 xor() 29641 MB/s May 10 00:44:57.648409 kernel: raid6: avx512x1 gen() 18417 MB/s May 10 00:44:57.669415 kernel: raid6: avx512x1 xor() 26819 MB/s May 10 00:44:57.689409 kernel: raid6: avx2x4 gen() 18380 MB/s May 10 00:44:57.709413 kernel: raid6: avx2x4 xor() 7624 MB/s May 10 00:44:57.729412 kernel: raid6: avx2x2 gen() 18328 MB/s May 10 00:44:57.750446 kernel: raid6: avx2x2 xor() 22300 MB/s May 10 00:44:57.770438 kernel: raid6: avx2x1 gen() 13967 MB/s May 10 00:44:57.800452 kernel: raid6: avx2x1 xor() 19208 MB/s May 10 00:44:57.820422 kernel: raid6: sse2x4 gen() 11610 MB/s May 10 00:44:57.841419 kernel: raid6: sse2x4 xor() 7393 MB/s May 10 00:44:57.862429 kernel: raid6: sse2x2 gen() 12922 MB/s May 10 00:44:57.882414 kernel: raid6: sse2x2 xor() 7691 MB/s May 10 00:44:57.902414 kernel: raid6: sse2x1 gen() 11569 MB/s May 10 00:44:57.925067 kernel: raid6: sse2x1 xor() 5887 MB/s May 10 00:44:57.925098 kernel: raid6: using algorithm avx512x1 gen() 18417 MB/s May 10 00:44:57.925112 kernel: raid6: .... xor() 26819 MB/s, rmw enabled May 10 00:44:57.933320 kernel: raid6: using avx512x2 recovery algorithm May 10 00:44:57.950424 kernel: xor: automatically using best checksumming function avx May 10 00:44:58.046430 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 10 00:44:58.054683 systemd[1]: Finished dracut-pre-udev.service. May 10 00:44:58.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:58.060000 audit: BPF prog-id=7 op=LOAD May 10 00:44:58.060000 audit: BPF prog-id=8 op=LOAD May 10 00:44:58.061654 systemd[1]: Starting systemd-udevd.service... May 10 00:44:58.075757 systemd-udevd[383]: Using default interface naming scheme 'v252'. May 10 00:44:58.080384 systemd[1]: Started systemd-udevd.service. May 10 00:44:58.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:58.087615 systemd[1]: Starting dracut-pre-trigger.service... May 10 00:44:58.105959 dracut-pre-trigger[401]: rd.md=0: removing MD RAID activation May 10 00:44:58.136427 systemd[1]: Finished dracut-pre-trigger.service. May 10 00:44:58.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:58.139562 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:44:58.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:58.175291 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:44:58.223419 kernel: cryptd: max_cpu_qlen set to 1000 May 10 00:44:58.266258 kernel: AVX2 version of gcm_enc/dec engaged. May 10 00:44:58.266320 kernel: AES CTR mode by8 optimization enabled May 10 00:44:58.266334 kernel: hv_vmbus: Vmbus version:5.2 May 10 00:44:58.280423 kernel: hv_vmbus: registering driver hyperv_keyboard May 10 00:44:58.290423 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 May 10 00:44:58.306414 kernel: hv_vmbus: registering driver hv_netvsc May 10 00:44:58.322256 kernel: hv_vmbus: registering driver hv_storvsc May 10 00:44:58.322321 kernel: hid: raw HID events driver (C) Jiri Kosina May 10 00:44:58.332947 kernel: hv_vmbus: registering driver hid_hyperv May 10 00:44:58.333016 kernel: scsi host1: storvsc_host_t May 10 00:44:58.335819 kernel: scsi host0: storvsc_host_t May 10 00:44:58.347424 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 May 10 00:44:58.347472 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on May 10 00:44:58.347641 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 May 10 00:44:58.358422 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 May 10 00:44:58.386549 kernel: sr 0:0:0:2: [sr0] scsi-1 drive May 10 00:44:58.387568 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 10 00:44:58.387582 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 May 10 00:44:58.388421 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) May 10 00:44:58.422107 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks May 10 00:44:58.422245 kernel: sd 0:0:0:0: [sda] Write Protect is off May 10 00:44:58.422349 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 May 10 00:44:58.422710 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA May 10 00:44:58.422917 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 10 00:44:58.422938 kernel: sd 0:0:0:0: [sda] Attached SCSI disk May 10 00:44:58.520088 kernel: hv_netvsc 7c1e5237-aabc-7c1e-5237-aabc7c1e5237 eth0: VF slot 1 added May 10 00:44:58.543715 kernel: hv_vmbus: registering driver hv_pci May 10 00:44:58.543782 kernel: hv_pci d0ddcfea-724b-4fe2-ac97-d2865f96a298: PCI VMBus probing: Using version 0x10004 May 10 00:44:58.638734 kernel: hv_pci d0ddcfea-724b-4fe2-ac97-d2865f96a298: PCI host bridge to bus 724b:00 May 10 00:44:58.638873 kernel: pci_bus 724b:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] May 10 00:44:58.638982 kernel: pci_bus 724b:00: No busn resource found for root bus, will use [bus 00-ff] May 10 00:44:58.639073 kernel: pci 724b:00:02.0: [15b3:1016] type 00 class 0x020000 May 10 00:44:58.639179 kernel: pci 724b:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] May 10 00:44:58.639277 kernel: pci 724b:00:02.0: enabling Extended Tags May 10 00:44:58.639372 kernel: pci 724b:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 724b:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) May 10 00:44:58.639531 kernel: pci_bus 724b:00: busn_res: [bus 00-ff] end is updated to 00 May 10 00:44:58.639673 kernel: pci 724b:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] May 10 00:44:58.739424 kernel: mlx5_core 724b:00:02.0: firmware version: 14.30.5000 May 10 00:44:59.055368 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (448) May 10 00:44:59.055424 kernel: mlx5_core 724b:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) May 10 00:44:59.055706 kernel: mlx5_core 724b:00:02.0: Supported tc offload range - chains: 1, prios: 1 May 10 00:44:59.056028 kernel: mlx5_core 724b:00:02.0: mlx5e_tc_post_act_init:40:(pid 16): firmware level support is missing May 10 00:44:59.056276 kernel: hv_netvsc 7c1e5237-aabc-7c1e-5237-aabc7c1e5237 eth0: VF registering: eth1 May 10 00:44:59.056376 kernel: mlx5_core 724b:00:02.0 eth1: joined to eth0 May 10 00:44:58.782866 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 10 00:44:58.804191 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:44:58.912307 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 10 00:44:58.916087 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 10 00:44:58.920668 systemd[1]: Starting disk-uuid.service... May 10 00:44:58.955221 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 10 00:44:59.083419 kernel: mlx5_core 724b:00:02.0 enP29259s1: renamed from eth1 May 10 00:44:59.946437 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 10 00:44:59.948165 disk-uuid[555]: The operation has completed successfully. May 10 00:45:00.026104 systemd[1]: disk-uuid.service: Deactivated successfully. May 10 00:45:00.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:00.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:00.026216 systemd[1]: Finished disk-uuid.service. May 10 00:45:00.044583 systemd[1]: Starting verity-setup.service... May 10 00:45:00.085419 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 10 00:45:00.243862 systemd[1]: Found device dev-mapper-usr.device. May 10 00:45:00.249816 systemd[1]: Mounting sysusr-usr.mount... May 10 00:45:00.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:00.251972 systemd[1]: Finished verity-setup.service. May 10 00:45:00.334428 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 00:45:00.334560 systemd[1]: Mounted sysusr-usr.mount. May 10 00:45:00.335909 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 10 00:45:00.337075 systemd[1]: Starting ignition-setup.service... May 10 00:45:00.342339 systemd[1]: Starting parse-ip-for-networkd.service... May 10 00:45:00.376060 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:45:00.376138 kernel: BTRFS info (device sda6): using free space tree May 10 00:45:00.376158 kernel: BTRFS info (device sda6): has skinny extents May 10 00:45:00.410233 systemd[1]: Finished parse-ip-for-networkd.service. May 10 00:45:00.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:00.415000 audit: BPF prog-id=9 op=LOAD May 10 00:45:00.416201 systemd[1]: Starting systemd-networkd.service... May 10 00:45:00.441495 systemd-networkd[801]: lo: Link UP May 10 00:45:00.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:00.441503 systemd-networkd[801]: lo: Gained carrier May 10 00:45:00.442051 systemd-networkd[801]: Enumeration completed May 10 00:45:00.442138 systemd[1]: Started systemd-networkd.service. May 10 00:45:00.445849 systemd[1]: Reached target network.target. May 10 00:45:00.446294 systemd-networkd[801]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:45:00.452626 systemd[1]: Starting iscsiuio.service... May 10 00:45:00.458608 systemd[1]: Started iscsiuio.service. May 10 00:45:00.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:00.475419 systemd[1]: Starting iscsid.service... May 10 00:45:00.485543 systemd[1]: Started iscsid.service. May 10 00:45:00.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:00.490044 iscsid[811]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 10 00:45:00.490044 iscsid[811]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 10 00:45:00.490044 iscsid[811]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 10 00:45:00.490044 iscsid[811]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 10 00:45:00.490044 iscsid[811]: If using hardware iscsi like qla4xxx this message can be ignored. May 10 00:45:00.490044 iscsid[811]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 10 00:45:00.490044 iscsid[811]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 10 00:45:00.489279 systemd[1]: Starting dracut-initqueue.service... May 10 00:45:00.527432 systemd[1]: mnt-oem.mount: Deactivated successfully. May 10 00:45:00.534963 systemd[1]: Finished dracut-initqueue.service. May 10 00:45:00.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:00.536156 systemd[1]: Reached target remote-fs-pre.target. May 10 00:45:00.536438 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:45:00.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:00.536853 systemd[1]: Reached target remote-fs.target. May 10 00:45:00.538093 systemd[1]: Starting dracut-pre-mount.service... May 10 00:45:00.561557 kernel: mlx5_core 724b:00:02.0 enP29259s1: Link up May 10 00:45:00.547018 systemd[1]: Finished dracut-pre-mount.service. May 10 00:45:00.594431 kernel: hv_netvsc 7c1e5237-aabc-7c1e-5237-aabc7c1e5237 eth0: Data path switched to VF: enP29259s1 May 10 00:45:00.596640 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:45:00.603769 systemd-networkd[801]: enP29259s1: Link UP May 10 00:45:00.603909 systemd-networkd[801]: eth0: Link UP May 10 00:45:00.604128 systemd-networkd[801]: eth0: Gained carrier May 10 00:45:00.612642 systemd-networkd[801]: enP29259s1: Gained carrier May 10 00:45:00.637516 systemd-networkd[801]: eth0: DHCPv4 address 10.200.8.32/24, gateway 10.200.8.1 acquired from 168.63.129.16 May 10 00:45:00.661707 systemd[1]: Finished ignition-setup.service. May 10 00:45:00.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:00.665843 systemd[1]: Starting ignition-fetch-offline.service... May 10 00:45:02.232652 systemd-networkd[801]: eth0: Gained IPv6LL May 10 00:45:03.137749 ignition[828]: Ignition 2.14.0 May 10 00:45:03.137763 ignition[828]: Stage: fetch-offline May 10 00:45:03.137842 ignition[828]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:45:03.137888 ignition[828]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 10 00:45:03.247251 ignition[828]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 10 00:45:03.256745 ignition[828]: parsed url from cmdline: "" May 10 00:45:03.256753 ignition[828]: no config URL provided May 10 00:45:03.256765 ignition[828]: reading system config file "/usr/lib/ignition/user.ign" May 10 00:45:03.256798 ignition[828]: no config at "/usr/lib/ignition/user.ign" May 10 00:45:03.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:03.268779 kernel: kauditd_printk_skb: 18 callbacks suppressed May 10 00:45:03.268807 kernel: audit: type=1130 audit(1746837903.263:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:03.259494 systemd[1]: Finished ignition-fetch-offline.service. May 10 00:45:03.256807 ignition[828]: failed to fetch config: resource requires networking May 10 00:45:03.270051 systemd[1]: Starting ignition-fetch.service... May 10 00:45:03.258393 ignition[828]: Ignition finished successfully May 10 00:45:03.278813 ignition[834]: Ignition 2.14.0 May 10 00:45:03.278821 ignition[834]: Stage: fetch May 10 00:45:03.278971 ignition[834]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:45:03.279013 ignition[834]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 10 00:45:03.285679 ignition[834]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 10 00:45:03.286138 ignition[834]: parsed url from cmdline: "" May 10 00:45:03.286145 ignition[834]: no config URL provided May 10 00:45:03.286152 ignition[834]: reading system config file "/usr/lib/ignition/user.ign" May 10 00:45:03.286161 ignition[834]: no config at "/usr/lib/ignition/user.ign" May 10 00:45:03.286288 ignition[834]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 May 10 00:45:03.551589 ignition[834]: GET result: OK May 10 00:45:03.551686 ignition[834]: config has been read from IMDS userdata May 10 00:45:03.551715 ignition[834]: parsing config with SHA512: 583b1ade472aff4ef9775b04ef60f0c1825ec6c2cf6dd1697bf0c45969fe8bc5ccb20c80a51ebbc2e1f5bdccb9ca62a2a9bbb7d69c860d2f4c1b8ca75f13817e May 10 00:45:03.555052 unknown[834]: fetched base config from "system" May 10 00:45:03.555637 ignition[834]: fetch: fetch complete May 10 00:45:03.555062 unknown[834]: fetched base config from "system" May 10 00:45:03.555645 ignition[834]: fetch: fetch passed May 10 00:45:03.555071 unknown[834]: fetched user config from "azure" May 10 00:45:03.555705 ignition[834]: Ignition finished successfully May 10 00:45:03.568161 systemd[1]: Finished ignition-fetch.service. May 10 00:45:03.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:03.571112 systemd[1]: Starting ignition-kargs.service... May 10 00:45:03.593917 kernel: audit: type=1130 audit(1746837903.569:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:03.598554 ignition[840]: Ignition 2.14.0 May 10 00:45:03.598565 ignition[840]: Stage: kargs May 10 00:45:03.598695 ignition[840]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:45:03.598731 ignition[840]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 10 00:45:03.608113 ignition[840]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 10 00:45:03.612274 ignition[840]: kargs: kargs passed May 10 00:45:03.612335 ignition[840]: Ignition finished successfully May 10 00:45:03.616561 systemd[1]: Finished ignition-kargs.service. May 10 00:45:03.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:03.634248 kernel: audit: type=1130 audit(1746837903.618:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:03.631911 systemd[1]: Starting ignition-disks.service... May 10 00:45:03.640011 ignition[846]: Ignition 2.14.0 May 10 00:45:03.640021 ignition[846]: Stage: disks May 10 00:45:03.640161 ignition[846]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:45:03.640195 ignition[846]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 10 00:45:03.646798 systemd[1]: Finished ignition-disks.service. May 10 00:45:03.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:03.643532 ignition[846]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 10 00:45:03.670722 kernel: audit: type=1130 audit(1746837903.648:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:03.648991 systemd[1]: Reached target initrd-root-device.target. May 10 00:45:03.645306 ignition[846]: disks: disks passed May 10 00:45:03.666080 systemd[1]: Reached target local-fs-pre.target. May 10 00:45:03.645372 ignition[846]: Ignition finished successfully May 10 00:45:03.670717 systemd[1]: Reached target local-fs.target. May 10 00:45:03.675128 systemd[1]: Reached target sysinit.target. May 10 00:45:03.685733 systemd[1]: Reached target basic.target. May 10 00:45:03.690309 systemd[1]: Starting systemd-fsck-root.service... May 10 00:45:03.740704 systemd-fsck[854]: ROOT: clean, 623/7326000 files, 481079/7359488 blocks May 10 00:45:03.750943 systemd[1]: Finished systemd-fsck-root.service. May 10 00:45:03.770015 kernel: audit: type=1130 audit(1746837903.752:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:03.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:03.754691 systemd[1]: Mounting sysroot.mount... May 10 00:45:03.784415 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 00:45:03.784945 systemd[1]: Mounted sysroot.mount. May 10 00:45:03.788784 systemd[1]: Reached target initrd-root-fs.target. May 10 00:45:03.826692 systemd[1]: Mounting sysroot-usr.mount... May 10 00:45:03.832047 systemd[1]: Starting flatcar-metadata-hostname.service... May 10 00:45:03.836493 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 10 00:45:03.836553 systemd[1]: Reached target ignition-diskful.target. May 10 00:45:03.845584 systemd[1]: Mounted sysroot-usr.mount. May 10 00:45:03.886921 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:45:03.892770 systemd[1]: Starting initrd-setup-root.service... May 10 00:45:03.902876 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (865) May 10 00:45:03.915114 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:45:03.915179 kernel: BTRFS info (device sda6): using free space tree May 10 00:45:03.915201 kernel: BTRFS info (device sda6): has skinny extents May 10 00:45:03.923698 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:45:03.929008 initrd-setup-root[870]: cut: /sysroot/etc/passwd: No such file or directory May 10 00:45:03.947632 initrd-setup-root[896]: cut: /sysroot/etc/group: No such file or directory May 10 00:45:03.967895 initrd-setup-root[904]: cut: /sysroot/etc/shadow: No such file or directory May 10 00:45:03.973459 initrd-setup-root[912]: cut: /sysroot/etc/gshadow: No such file or directory May 10 00:45:04.404086 systemd[1]: Finished initrd-setup-root.service. May 10 00:45:04.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:04.407275 systemd[1]: Starting ignition-mount.service... May 10 00:45:04.433342 kernel: audit: type=1130 audit(1746837904.406:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:04.431286 systemd[1]: Starting sysroot-boot.service... May 10 00:45:04.435517 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 10 00:45:04.435645 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 10 00:45:04.459241 ignition[932]: INFO : Ignition 2.14.0 May 10 00:45:04.459241 ignition[932]: INFO : Stage: mount May 10 00:45:04.463376 ignition[932]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:45:04.463376 ignition[932]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 10 00:45:04.478920 systemd[1]: Finished sysroot-boot.service. May 10 00:45:04.482025 ignition[932]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 10 00:45:04.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:04.493499 ignition[932]: INFO : mount: mount passed May 10 00:45:04.493499 ignition[932]: INFO : Ignition finished successfully May 10 00:45:04.512857 kernel: audit: type=1130 audit(1746837904.485:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:04.512894 kernel: audit: type=1130 audit(1746837904.501:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:04.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:04.493778 systemd[1]: Finished ignition-mount.service. May 10 00:45:04.997948 coreos-metadata[864]: May 10 00:45:04.997 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 May 10 00:45:05.012962 coreos-metadata[864]: May 10 00:45:05.012 INFO Fetch successful May 10 00:45:05.059393 coreos-metadata[864]: May 10 00:45:05.059 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 May 10 00:45:05.069130 coreos-metadata[864]: May 10 00:45:05.069 INFO Fetch successful May 10 00:45:05.086849 coreos-metadata[864]: May 10 00:45:05.086 INFO wrote hostname ci-3510.3.7-n-a3a45e53be to /sysroot/etc/hostname May 10 00:45:05.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:05.089322 systemd[1]: Finished flatcar-metadata-hostname.service. May 10 00:45:05.116611 kernel: audit: type=1130 audit(1746837905.094:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:05.096133 systemd[1]: Starting ignition-files.service... May 10 00:45:05.120046 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:45:05.138418 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (944) May 10 00:45:05.146961 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:45:05.146996 kernel: BTRFS info (device sda6): using free space tree May 10 00:45:05.147010 kernel: BTRFS info (device sda6): has skinny extents May 10 00:45:05.156099 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:45:05.170563 ignition[963]: INFO : Ignition 2.14.0 May 10 00:45:05.170563 ignition[963]: INFO : Stage: files May 10 00:45:05.174626 ignition[963]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:45:05.174626 ignition[963]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 10 00:45:05.184340 ignition[963]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 10 00:45:05.189182 ignition[963]: DEBUG : files: compiled without relabeling support, skipping May 10 00:45:05.193980 ignition[963]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 10 00:45:05.193980 ignition[963]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 10 00:45:05.243072 ignition[963]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 10 00:45:05.248927 ignition[963]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 10 00:45:05.256706 unknown[963]: wrote ssh authorized keys file for user: core May 10 00:45:05.260767 ignition[963]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 10 00:45:05.269061 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 10 00:45:05.274450 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 10 00:45:05.274450 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:45:05.274450 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:45:05.274450 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:45:05.274450 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:45:05.274450 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" May 10 00:45:05.274450 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition May 10 00:45:05.315356 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2487264740" May 10 00:45:05.315356 ignition[963]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2487264740": device or resource busy May 10 00:45:05.315356 ignition[963]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2487264740", trying btrfs: device or resource busy May 10 00:45:05.315356 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2487264740" May 10 00:45:05.336591 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2487264740" May 10 00:45:05.336591 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem2487264740" May 10 00:45:05.336591 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem2487264740" May 10 00:45:05.336591 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" May 10 00:45:05.336591 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" May 10 00:45:05.336591 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition May 10 00:45:05.336591 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1222715394" May 10 00:45:05.336591 ignition[963]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1222715394": device or resource busy May 10 00:45:05.336591 ignition[963]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1222715394", trying btrfs: device or resource busy May 10 00:45:05.336591 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1222715394" May 10 00:45:05.320693 systemd[1]: mnt-oem2487264740.mount: Deactivated successfully. May 10 00:45:05.398226 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1222715394" May 10 00:45:05.398226 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem1222715394" May 10 00:45:05.398226 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem1222715394" May 10 00:45:05.398226 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" May 10 00:45:05.398226 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:45:05.398226 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 May 10 00:45:05.339144 systemd[1]: mnt-oem1222715394.mount: Deactivated successfully. May 10 00:45:05.755492 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK May 10 00:45:06.144359 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:45:06.151926 ignition[963]: INFO : files: op(f): [started] processing unit "waagent.service" May 10 00:45:06.151926 ignition[963]: INFO : files: op(f): [finished] processing unit "waagent.service" May 10 00:45:06.151926 ignition[963]: INFO : files: op(10): [started] processing unit "nvidia.service" May 10 00:45:06.161416 ignition[963]: INFO : files: op(10): [finished] processing unit "nvidia.service" May 10 00:45:06.161416 ignition[963]: INFO : files: op(11): [started] setting preset to enabled for "nvidia.service" May 10 00:45:06.161416 ignition[963]: INFO : files: op(11): [finished] setting preset to enabled for "nvidia.service" May 10 00:45:06.161416 ignition[963]: INFO : files: op(12): [started] setting preset to enabled for "waagent.service" May 10 00:45:06.161416 ignition[963]: INFO : files: op(12): [finished] setting preset to enabled for "waagent.service" May 10 00:45:06.180733 ignition[963]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" May 10 00:45:06.180733 ignition[963]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" May 10 00:45:06.180733 ignition[963]: INFO : files: files passed May 10 00:45:06.198318 ignition[963]: INFO : Ignition finished successfully May 10 00:45:06.202719 systemd[1]: Finished ignition-files.service. May 10 00:45:06.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.223917 kernel: audit: type=1130 audit(1746837906.204:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.221379 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 10 00:45:06.225478 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 10 00:45:06.226265 systemd[1]: Starting ignition-quench.service... May 10 00:45:06.239146 systemd[1]: ignition-quench.service: Deactivated successfully. May 10 00:45:06.247502 initrd-setup-root-after-ignition[989]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 10 00:45:06.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.239361 systemd[1]: Finished ignition-quench.service. May 10 00:45:06.251543 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 10 00:45:06.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.261101 systemd[1]: Reached target ignition-complete.target. May 10 00:45:06.268631 systemd[1]: Starting initrd-parse-etc.service... May 10 00:45:06.290454 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 10 00:45:06.296957 systemd[1]: Finished initrd-parse-etc.service. May 10 00:45:06.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.303343 systemd[1]: Reached target initrd-fs.target. May 10 00:45:06.306185 systemd[1]: Reached target initrd.target. May 10 00:45:06.314628 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 10 00:45:06.320612 systemd[1]: Starting dracut-pre-pivot.service... May 10 00:45:06.336469 systemd[1]: Finished dracut-pre-pivot.service. May 10 00:45:06.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.338346 systemd[1]: Starting initrd-cleanup.service... May 10 00:45:06.348057 systemd[1]: Stopped target nss-lookup.target. May 10 00:45:06.350274 systemd[1]: Stopped target remote-cryptsetup.target. May 10 00:45:06.360089 systemd[1]: Stopped target timers.target. May 10 00:45:06.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.361620 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 10 00:45:06.431138 iscsid[811]: iscsid shutting down. May 10 00:45:06.361755 systemd[1]: Stopped dracut-pre-pivot.service. May 10 00:45:06.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.454373 ignition[1002]: INFO : Ignition 2.14.0 May 10 00:45:06.454373 ignition[1002]: INFO : Stage: umount May 10 00:45:06.454373 ignition[1002]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:45:06.454373 ignition[1002]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 10 00:45:06.454373 ignition[1002]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 10 00:45:06.454373 ignition[1002]: INFO : umount: umount passed May 10 00:45:06.454373 ignition[1002]: INFO : Ignition finished successfully May 10 00:45:06.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.362362 systemd[1]: Stopped target initrd.target. May 10 00:45:06.362855 systemd[1]: Stopped target basic.target. May 10 00:45:06.363376 systemd[1]: Stopped target ignition-complete.target. May 10 00:45:06.364077 systemd[1]: Stopped target ignition-diskful.target. May 10 00:45:06.364658 systemd[1]: Stopped target initrd-root-device.target. May 10 00:45:06.365189 systemd[1]: Stopped target remote-fs.target. May 10 00:45:06.365850 systemd[1]: Stopped target remote-fs-pre.target. May 10 00:45:06.366496 systemd[1]: Stopped target sysinit.target. May 10 00:45:06.367103 systemd[1]: Stopped target local-fs.target. May 10 00:45:06.367641 systemd[1]: Stopped target local-fs-pre.target. May 10 00:45:06.368134 systemd[1]: Stopped target swap.target. May 10 00:45:06.368586 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 10 00:45:06.368709 systemd[1]: Stopped dracut-pre-mount.service. May 10 00:45:06.369223 systemd[1]: Stopped target cryptsetup.target. May 10 00:45:06.369728 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 10 00:45:06.369841 systemd[1]: Stopped dracut-initqueue.service. May 10 00:45:06.370298 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 10 00:45:06.370427 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 10 00:45:06.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.370732 systemd[1]: ignition-files.service: Deactivated successfully. May 10 00:45:06.370832 systemd[1]: Stopped ignition-files.service. May 10 00:45:06.371299 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. May 10 00:45:06.371418 systemd[1]: Stopped flatcar-metadata-hostname.service. May 10 00:45:06.372704 systemd[1]: Stopping ignition-mount.service... May 10 00:45:06.375229 systemd[1]: Stopping iscsid.service... May 10 00:45:06.376127 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 10 00:45:06.376269 systemd[1]: Stopped kmod-static-nodes.service. May 10 00:45:06.416851 systemd[1]: Stopping sysroot-boot.service... May 10 00:45:06.427427 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 10 00:45:06.427627 systemd[1]: Stopped systemd-udev-trigger.service. May 10 00:45:06.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.442672 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 10 00:45:06.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.442801 systemd[1]: Stopped dracut-pre-trigger.service. May 10 00:45:06.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.503060 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 10 00:45:06.532788 systemd[1]: iscsid.service: Deactivated successfully. May 10 00:45:06.532886 systemd[1]: Stopped iscsid.service. May 10 00:45:06.572439 systemd[1]: ignition-mount.service: Deactivated successfully. May 10 00:45:06.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.575977 systemd[1]: Stopped ignition-mount.service. May 10 00:45:06.585781 systemd[1]: ignition-disks.service: Deactivated successfully. May 10 00:45:06.585884 systemd[1]: Stopped ignition-disks.service. May 10 00:45:06.589452 systemd[1]: ignition-kargs.service: Deactivated successfully. May 10 00:45:06.589509 systemd[1]: Stopped ignition-kargs.service. May 10 00:45:06.593779 systemd[1]: ignition-fetch.service: Deactivated successfully. May 10 00:45:06.593816 systemd[1]: Stopped ignition-fetch.service. May 10 00:45:06.595853 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 10 00:45:06.595891 systemd[1]: Stopped ignition-fetch-offline.service. May 10 00:45:06.598086 systemd[1]: Stopped target paths.target. May 10 00:45:06.601536 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 10 00:45:06.603634 systemd[1]: Stopped systemd-ask-password-console.path. May 10 00:45:06.605827 systemd[1]: Stopped target slices.target. May 10 00:45:06.607726 systemd[1]: Stopped target sockets.target. May 10 00:45:06.612103 systemd[1]: iscsid.socket: Deactivated successfully. May 10 00:45:06.612154 systemd[1]: Closed iscsid.socket. May 10 00:45:06.615373 systemd[1]: ignition-setup.service: Deactivated successfully. May 10 00:45:06.615447 systemd[1]: Stopped ignition-setup.service. May 10 00:45:06.620477 systemd[1]: Stopping iscsiuio.service... May 10 00:45:06.663587 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 10 00:45:06.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.663715 systemd[1]: Finished initrd-cleanup.service. May 10 00:45:06.670756 systemd[1]: iscsiuio.service: Deactivated successfully. May 10 00:45:06.673508 systemd[1]: Stopped iscsiuio.service. May 10 00:45:06.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.678289 systemd[1]: Stopped target network.target. May 10 00:45:06.682769 systemd[1]: iscsiuio.socket: Deactivated successfully. May 10 00:45:06.682818 systemd[1]: Closed iscsiuio.socket. May 10 00:45:06.687693 systemd[1]: Stopping systemd-networkd.service... May 10 00:45:06.692871 systemd[1]: Stopping systemd-resolved.service... May 10 00:45:06.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.696550 systemd-networkd[801]: eth0: DHCPv6 lease lost May 10 00:45:06.700229 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 00:45:06.709000 audit: BPF prog-id=9 op=UNLOAD May 10 00:45:06.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.700337 systemd[1]: Stopped systemd-networkd.service. May 10 00:45:06.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.703128 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 10 00:45:06.703173 systemd[1]: Closed systemd-networkd.socket. May 10 00:45:06.707543 systemd[1]: Stopping network-cleanup.service... May 10 00:45:06.709979 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 10 00:45:06.710043 systemd[1]: Stopped parse-ip-for-networkd.service. May 10 00:45:06.715208 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 10 00:45:06.715266 systemd[1]: Stopped systemd-sysctl.service. May 10 00:45:06.719328 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 10 00:45:06.722140 systemd[1]: Stopped systemd-modules-load.service. May 10 00:45:06.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.743661 systemd[1]: Stopping systemd-udevd.service... May 10 00:45:06.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.747244 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 10 00:45:06.747796 systemd[1]: systemd-resolved.service: Deactivated successfully. May 10 00:45:06.747892 systemd[1]: Stopped systemd-resolved.service. May 10 00:45:06.756463 systemd[1]: systemd-udevd.service: Deactivated successfully. May 10 00:45:06.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.756641 systemd[1]: Stopped systemd-udevd.service. May 10 00:45:06.763000 audit: BPF prog-id=6 op=UNLOAD May 10 00:45:06.763776 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 10 00:45:06.763816 systemd[1]: Closed systemd-udevd-control.socket. May 10 00:45:06.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.766927 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 10 00:45:06.766970 systemd[1]: Closed systemd-udevd-kernel.socket. May 10 00:45:06.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.771631 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 10 00:45:06.771686 systemd[1]: Stopped dracut-pre-udev.service. May 10 00:45:06.775684 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 10 00:45:06.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.775738 systemd[1]: Stopped dracut-cmdline.service. May 10 00:45:06.780151 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 10 00:45:06.809285 kernel: hv_netvsc 7c1e5237-aabc-7c1e-5237-aabc7c1e5237 eth0: Data path switched from VF: enP29259s1 May 10 00:45:06.780197 systemd[1]: Stopped dracut-cmdline-ask.service. May 10 00:45:06.785260 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 10 00:45:06.789491 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 10 00:45:06.789556 systemd[1]: Stopped systemd-vconsole-setup.service. May 10 00:45:06.794803 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 10 00:45:06.794899 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 10 00:45:06.825063 systemd[1]: sysroot-boot.service: Deactivated successfully. May 10 00:45:06.827384 systemd[1]: Stopped sysroot-boot.service. May 10 00:45:06.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.831262 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 10 00:45:06.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.831324 systemd[1]: Stopped initrd-setup-root.service. May 10 00:45:06.838048 systemd[1]: network-cleanup.service: Deactivated successfully. May 10 00:45:06.845504 systemd[1]: Stopped network-cleanup.service. May 10 00:45:06.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:06.849938 systemd[1]: Reached target initrd-switch-root.target. May 10 00:45:06.855498 systemd[1]: Starting initrd-switch-root.service... May 10 00:45:06.866832 systemd[1]: Switching root. May 10 00:45:06.892079 systemd-journald[183]: Journal stopped May 10 00:45:18.232525 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). May 10 00:45:18.232552 kernel: SELinux: Class mctp_socket not defined in policy. May 10 00:45:18.232566 kernel: SELinux: Class anon_inode not defined in policy. May 10 00:45:18.232578 kernel: SELinux: the above unknown classes and permissions will be allowed May 10 00:45:18.232585 kernel: SELinux: policy capability network_peer_controls=1 May 10 00:45:18.232597 kernel: SELinux: policy capability open_perms=1 May 10 00:45:18.232608 kernel: SELinux: policy capability extended_socket_class=1 May 10 00:45:18.232619 kernel: SELinux: policy capability always_check_network=0 May 10 00:45:18.232628 kernel: SELinux: policy capability cgroup_seclabel=1 May 10 00:45:18.232641 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 10 00:45:18.232655 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 10 00:45:18.232671 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 10 00:45:18.232688 kernel: kauditd_printk_skb: 42 callbacks suppressed May 10 00:45:18.232705 kernel: audit: type=1403 audit(1746837908.783:81): auid=4294967295 ses=4294967295 lsm=selinux res=1 May 10 00:45:18.232726 systemd[1]: Successfully loaded SELinux policy in 225.394ms. May 10 00:45:18.232748 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.233ms. May 10 00:45:18.232771 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:45:18.232788 systemd[1]: Detected virtualization microsoft. May 10 00:45:18.232808 systemd[1]: Detected architecture x86-64. May 10 00:45:18.232825 systemd[1]: Detected first boot. May 10 00:45:18.232843 systemd[1]: Hostname set to . May 10 00:45:18.232861 systemd[1]: Initializing machine ID from random generator. May 10 00:45:18.232879 kernel: audit: type=1400 audit(1746837909.386:82): avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:45:18.232898 kernel: audit: type=1400 audit(1746837909.404:83): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:45:18.232915 kernel: audit: type=1400 audit(1746837909.404:84): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:45:18.232936 kernel: audit: type=1334 audit(1746837909.433:85): prog-id=10 op=LOAD May 10 00:45:18.232952 kernel: audit: type=1334 audit(1746837909.433:86): prog-id=10 op=UNLOAD May 10 00:45:18.232967 kernel: audit: type=1334 audit(1746837909.440:87): prog-id=11 op=LOAD May 10 00:45:18.232984 kernel: audit: type=1334 audit(1746837909.440:88): prog-id=11 op=UNLOAD May 10 00:45:18.233000 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 10 00:45:18.233017 kernel: audit: type=1400 audit(1746837910.540:89): avc: denied { associate } for pid=1035 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 00:45:18.233036 kernel: audit: type=1300 audit(1746837910.540:89): arch=c000003e syscall=188 success=yes exit=0 a0=c00018a7d2 a1=c00018ea80 a2=c00019ccc0 a3=32 items=0 ppid=1018 pid=1035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:18.233057 systemd[1]: Populated /etc with preset unit settings. May 10 00:45:18.233075 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:45:18.233095 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:45:18.233116 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:45:18.233135 kernel: kauditd_printk_skb: 7 callbacks suppressed May 10 00:45:18.233153 kernel: audit: type=1334 audit(1746837917.664:91): prog-id=12 op=LOAD May 10 00:45:18.233170 kernel: audit: type=1334 audit(1746837917.664:92): prog-id=3 op=UNLOAD May 10 00:45:18.233190 kernel: audit: type=1334 audit(1746837917.670:93): prog-id=13 op=LOAD May 10 00:45:18.233212 kernel: audit: type=1334 audit(1746837917.674:94): prog-id=14 op=LOAD May 10 00:45:18.233229 kernel: audit: type=1334 audit(1746837917.675:95): prog-id=4 op=UNLOAD May 10 00:45:18.233246 kernel: audit: type=1334 audit(1746837917.675:96): prog-id=5 op=UNLOAD May 10 00:45:18.233262 kernel: audit: type=1334 audit(1746837917.679:97): prog-id=15 op=LOAD May 10 00:45:18.233279 kernel: audit: type=1334 audit(1746837917.679:98): prog-id=12 op=UNLOAD May 10 00:45:18.233296 kernel: audit: type=1334 audit(1746837917.694:99): prog-id=16 op=LOAD May 10 00:45:18.233313 kernel: audit: type=1334 audit(1746837917.714:100): prog-id=17 op=LOAD May 10 00:45:18.233329 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 10 00:45:18.233350 systemd[1]: Stopped initrd-switch-root.service. May 10 00:45:18.233371 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 10 00:45:18.233389 systemd[1]: Created slice system-addon\x2dconfig.slice. May 10 00:45:18.233418 systemd[1]: Created slice system-addon\x2drun.slice. May 10 00:45:18.233435 systemd[1]: Created slice system-getty.slice. May 10 00:45:18.233454 systemd[1]: Created slice system-modprobe.slice. May 10 00:45:18.233472 systemd[1]: Created slice system-serial\x2dgetty.slice. May 10 00:45:18.233489 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 10 00:45:18.233512 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 10 00:45:18.233531 systemd[1]: Created slice user.slice. May 10 00:45:18.233550 systemd[1]: Started systemd-ask-password-console.path. May 10 00:45:18.233567 systemd[1]: Started systemd-ask-password-wall.path. May 10 00:45:18.233585 systemd[1]: Set up automount boot.automount. May 10 00:45:18.233604 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 10 00:45:18.233623 systemd[1]: Stopped target initrd-switch-root.target. May 10 00:45:18.233641 systemd[1]: Stopped target initrd-fs.target. May 10 00:45:18.233658 systemd[1]: Stopped target initrd-root-fs.target. May 10 00:45:18.233677 systemd[1]: Reached target integritysetup.target. May 10 00:45:18.233697 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:45:18.233714 systemd[1]: Reached target remote-fs.target. May 10 00:45:18.233727 systemd[1]: Reached target slices.target. May 10 00:45:18.233741 systemd[1]: Reached target swap.target. May 10 00:45:18.233754 systemd[1]: Reached target torcx.target. May 10 00:45:18.233769 systemd[1]: Reached target veritysetup.target. May 10 00:45:18.233786 systemd[1]: Listening on systemd-coredump.socket. May 10 00:45:18.233796 systemd[1]: Listening on systemd-initctl.socket. May 10 00:45:18.233806 systemd[1]: Listening on systemd-networkd.socket. May 10 00:45:18.233819 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:45:18.233831 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:45:18.233846 systemd[1]: Listening on systemd-userdbd.socket. May 10 00:45:18.233860 systemd[1]: Mounting dev-hugepages.mount... May 10 00:45:18.233869 systemd[1]: Mounting dev-mqueue.mount... May 10 00:45:18.233882 systemd[1]: Mounting media.mount... May 10 00:45:18.233893 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:45:18.233903 systemd[1]: Mounting sys-kernel-debug.mount... May 10 00:45:18.233912 systemd[1]: Mounting sys-kernel-tracing.mount... May 10 00:45:18.233922 systemd[1]: Mounting tmp.mount... May 10 00:45:18.233931 systemd[1]: Starting flatcar-tmpfiles.service... May 10 00:45:18.233946 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:45:18.233956 systemd[1]: Starting kmod-static-nodes.service... May 10 00:45:18.233968 systemd[1]: Starting modprobe@configfs.service... May 10 00:45:18.233979 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:45:18.233991 systemd[1]: Starting modprobe@drm.service... May 10 00:45:18.234001 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:45:18.234011 systemd[1]: Starting modprobe@fuse.service... May 10 00:45:18.234021 systemd[1]: Starting modprobe@loop.service... May 10 00:45:18.234034 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 00:45:18.234049 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 10 00:45:18.234064 systemd[1]: Stopped systemd-fsck-root.service. May 10 00:45:18.234074 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 10 00:45:18.234084 systemd[1]: Stopped systemd-fsck-usr.service. May 10 00:45:18.234097 systemd[1]: Stopped systemd-journald.service. May 10 00:45:18.234108 systemd[1]: Starting systemd-journald.service... May 10 00:45:18.234119 kernel: loop: module loaded May 10 00:45:18.234130 systemd[1]: Starting systemd-modules-load.service... May 10 00:45:18.234142 systemd[1]: Starting systemd-network-generator.service... May 10 00:45:18.234155 kernel: fuse: init (API version 7.34) May 10 00:45:18.234167 systemd[1]: Starting systemd-remount-fs.service... May 10 00:45:18.234177 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:45:18.234187 systemd[1]: verity-setup.service: Deactivated successfully. May 10 00:45:18.234196 systemd[1]: Stopped verity-setup.service. May 10 00:45:18.234213 systemd-journald[1145]: Journal started May 10 00:45:18.234265 systemd-journald[1145]: Runtime Journal (/run/log/journal/a22d190d340242c7b8740b16126a65fe) is 8.0M, max 159.0M, 151.0M free. May 10 00:45:08.783000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 10 00:45:09.386000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:45:09.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:45:09.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:45:09.433000 audit: BPF prog-id=10 op=LOAD May 10 00:45:09.433000 audit: BPF prog-id=10 op=UNLOAD May 10 00:45:09.440000 audit: BPF prog-id=11 op=LOAD May 10 00:45:09.440000 audit: BPF prog-id=11 op=UNLOAD May 10 00:45:10.540000 audit[1035]: AVC avc: denied { associate } for pid=1035 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 00:45:10.540000 audit[1035]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00018a7d2 a1=c00018ea80 a2=c00019ccc0 a3=32 items=0 ppid=1018 pid=1035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:10.540000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:45:10.552000 audit[1035]: AVC avc: denied { associate } for pid=1035 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 10 00:45:10.552000 audit[1035]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00018a8a9 a2=1ed a3=0 items=2 ppid=1018 pid=1035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:10.552000 audit: CWD cwd="/" May 10 00:45:10.552000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:10.552000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:10.552000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:45:17.664000 audit: BPF prog-id=12 op=LOAD May 10 00:45:17.664000 audit: BPF prog-id=3 op=UNLOAD May 10 00:45:17.670000 audit: BPF prog-id=13 op=LOAD May 10 00:45:17.674000 audit: BPF prog-id=14 op=LOAD May 10 00:45:17.675000 audit: BPF prog-id=4 op=UNLOAD May 10 00:45:17.675000 audit: BPF prog-id=5 op=UNLOAD May 10 00:45:17.679000 audit: BPF prog-id=15 op=LOAD May 10 00:45:17.679000 audit: BPF prog-id=12 op=UNLOAD May 10 00:45:17.694000 audit: BPF prog-id=16 op=LOAD May 10 00:45:17.714000 audit: BPF prog-id=17 op=LOAD May 10 00:45:17.714000 audit: BPF prog-id=13 op=UNLOAD May 10 00:45:17.714000 audit: BPF prog-id=14 op=UNLOAD May 10 00:45:17.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:17.725000 audit: BPF prog-id=15 op=UNLOAD May 10 00:45:17.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:17.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.146000 audit: BPF prog-id=18 op=LOAD May 10 00:45:18.147000 audit: BPF prog-id=19 op=LOAD May 10 00:45:18.147000 audit: BPF prog-id=20 op=LOAD May 10 00:45:18.147000 audit: BPF prog-id=16 op=UNLOAD May 10 00:45:18.147000 audit: BPF prog-id=17 op=UNLOAD May 10 00:45:18.225000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 10 00:45:18.225000 audit[1145]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffcb26e2810 a2=4000 a3=7ffcb26e28ac items=0 ppid=1 pid=1145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:18.225000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 10 00:45:17.663139 systemd[1]: Queued start job for default target multi-user.target. May 10 00:45:10.500995 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:45:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:45:17.663152 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 10 00:45:10.513706 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:45:10Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:45:17.715273 systemd[1]: systemd-journald.service: Deactivated successfully. May 10 00:45:10.513901 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:45:10Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:45:10.513987 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:45:10Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 10 00:45:10.514001 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:45:10Z" level=debug msg="skipped missing lower profile" missing profile=oem May 10 00:45:10.514051 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:45:10Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 10 00:45:10.514070 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:45:10Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 10 00:45:10.514350 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:45:10Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 10 00:45:10.514386 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:45:10Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:45:10.514418 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:45:10Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:45:18.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:10.527783 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:45:10Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 10 00:45:10.527848 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:45:10Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 10 00:45:10.527889 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:45:10Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 10 00:45:10.527905 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:45:10Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 10 00:45:10.527928 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:45:10Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 10 00:45:10.527941 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:45:10Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 10 00:45:16.473703 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:45:16Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:45:16.473957 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:45:16Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:45:16.474091 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:45:16Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:45:16.474281 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:45:16Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:45:16.474332 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:45:16Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 10 00:45:16.474408 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2025-05-10T00:45:16Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 10 00:45:18.244414 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:45:18.250433 systemd[1]: Started systemd-journald.service. May 10 00:45:18.258502 systemd[1]: Mounted dev-hugepages.mount. May 10 00:45:18.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.264286 systemd[1]: Mounted dev-mqueue.mount. May 10 00:45:18.267383 systemd[1]: Mounted media.mount. May 10 00:45:18.271224 systemd[1]: Mounted sys-kernel-debug.mount. May 10 00:45:18.273663 systemd[1]: Mounted sys-kernel-tracing.mount. May 10 00:45:18.275947 systemd[1]: Mounted tmp.mount. May 10 00:45:18.277944 systemd[1]: Finished flatcar-tmpfiles.service. May 10 00:45:18.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.280469 systemd[1]: Finished kmod-static-nodes.service. May 10 00:45:18.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.283215 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 10 00:45:18.283359 systemd[1]: Finished modprobe@configfs.service. May 10 00:45:18.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.285762 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:45:18.285911 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:45:18.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.289179 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:45:18.289319 systemd[1]: Finished modprobe@drm.service. May 10 00:45:18.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.291715 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:45:18.291852 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:45:18.294568 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 10 00:45:18.294725 systemd[1]: Finished modprobe@fuse.service. May 10 00:45:18.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.297048 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:45:18.297304 systemd[1]: Finished modprobe@loop.service. May 10 00:45:18.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.299912 systemd[1]: Finished systemd-network-generator.service. May 10 00:45:18.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.302857 systemd[1]: Finished systemd-modules-load.service. May 10 00:45:18.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.306025 systemd[1]: Finished systemd-remount-fs.service. May 10 00:45:18.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.309302 systemd[1]: Reached target network-pre.target. May 10 00:45:18.314559 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 10 00:45:18.327109 systemd[1]: Mounting sys-kernel-config.mount... May 10 00:45:18.331970 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 00:45:18.334258 systemd[1]: Starting systemd-hwdb-update.service... May 10 00:45:18.338241 systemd[1]: Starting systemd-journal-flush.service... May 10 00:45:18.340740 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:45:18.342378 systemd[1]: Starting systemd-random-seed.service... May 10 00:45:18.344636 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:45:18.346186 systemd[1]: Starting systemd-sysctl.service... May 10 00:45:18.349847 systemd[1]: Starting systemd-sysusers.service... May 10 00:45:18.357055 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 10 00:45:18.359838 systemd[1]: Mounted sys-kernel-config.mount. May 10 00:45:18.370974 systemd[1]: Finished systemd-random-seed.service. May 10 00:45:18.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.373752 systemd[1]: Reached target first-boot-complete.target. May 10 00:45:18.380034 systemd-journald[1145]: Time spent on flushing to /var/log/journal/a22d190d340242c7b8740b16126a65fe is 25.650ms for 1137 entries. May 10 00:45:18.380034 systemd-journald[1145]: System Journal (/var/log/journal/a22d190d340242c7b8740b16126a65fe) is 8.0M, max 2.6G, 2.6G free. May 10 00:45:18.491118 systemd-journald[1145]: Received client request to flush runtime journal. May 10 00:45:18.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.393563 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:45:18.492247 udevadm[1159]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 10 00:45:18.398271 systemd[1]: Starting systemd-udev-settle.service... May 10 00:45:18.454605 systemd[1]: Finished systemd-sysctl.service. May 10 00:45:18.492206 systemd[1]: Finished systemd-journal-flush.service. May 10 00:45:18.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:18.844636 systemd[1]: Finished systemd-sysusers.service. May 10 00:45:18.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:19.322589 systemd[1]: Finished systemd-hwdb-update.service. May 10 00:45:19.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:19.325000 audit: BPF prog-id=21 op=LOAD May 10 00:45:19.325000 audit: BPF prog-id=22 op=LOAD May 10 00:45:19.325000 audit: BPF prog-id=7 op=UNLOAD May 10 00:45:19.325000 audit: BPF prog-id=8 op=UNLOAD May 10 00:45:19.326481 systemd[1]: Starting systemd-udevd.service... May 10 00:45:19.345054 systemd-udevd[1162]: Using default interface naming scheme 'v252'. May 10 00:45:19.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:19.556000 audit: BPF prog-id=23 op=LOAD May 10 00:45:19.550914 systemd[1]: Started systemd-udevd.service. May 10 00:45:19.557836 systemd[1]: Starting systemd-networkd.service... May 10 00:45:19.598461 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 10 00:45:19.670000 audit: BPF prog-id=24 op=LOAD May 10 00:45:19.670000 audit: BPF prog-id=25 op=LOAD May 10 00:45:19.670000 audit: BPF prog-id=26 op=LOAD May 10 00:45:19.671700 systemd[1]: Starting systemd-userdbd.service... May 10 00:45:19.701419 kernel: mousedev: PS/2 mouse device common for all mice May 10 00:45:19.727417 kernel: hv_vmbus: registering driver hyperv_fb May 10 00:45:19.742110 kernel: hyperv_fb: Synthvid Version major 3, minor 5 May 10 00:45:19.742196 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 May 10 00:45:19.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:19.739750 systemd[1]: Started systemd-userdbd.service. May 10 00:45:19.749605 kernel: Console: switching to colour dummy device 80x25 May 10 00:45:19.690000 audit[1178]: AVC avc: denied { confidentiality } for pid=1178 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:45:19.753421 kernel: hv_vmbus: registering driver hv_balloon May 10 00:45:19.753487 kernel: Console: switching to colour frame buffer device 128x48 May 10 00:45:19.756412 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 May 10 00:45:19.769014 kernel: hv_utils: Registering HyperV Utility Driver May 10 00:45:19.769097 kernel: hv_vmbus: registering driver hv_utils May 10 00:45:19.690000 audit[1178]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5608df846620 a1=f884 a2=7fbc286bcbc5 a3=5 items=12 ppid=1162 pid=1178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:19.690000 audit: CWD cwd="/" May 10 00:45:19.690000 audit: PATH item=0 name=(null) inode=235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:19.690000 audit: PATH item=1 name=(null) inode=15299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:19.690000 audit: PATH item=2 name=(null) inode=15299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:19.690000 audit: PATH item=3 name=(null) inode=15300 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:19.690000 audit: PATH item=4 name=(null) inode=15299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:19.690000 audit: PATH item=5 name=(null) inode=15301 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:19.690000 audit: PATH item=6 name=(null) inode=15299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:19.690000 audit: PATH item=7 name=(null) inode=15302 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:19.690000 audit: PATH item=8 name=(null) inode=15299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:19.690000 audit: PATH item=9 name=(null) inode=15303 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:19.690000 audit: PATH item=10 name=(null) inode=15299 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:19.690000 audit: PATH item=11 name=(null) inode=15304 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:19.690000 audit: PROCTITLE proctitle="(udev-worker)" May 10 00:45:19.780730 kernel: hv_utils: Heartbeat IC version 3.0 May 10 00:45:19.780809 kernel: hv_utils: Shutdown IC version 3.2 May 10 00:45:19.780837 kernel: hv_utils: TimeSync IC version 4.0 May 10 00:45:20.678898 kernel: KVM: vmx: using Hyper-V Enlightened VMCS May 10 00:45:20.685919 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:45:20.705655 systemd-networkd[1169]: lo: Link UP May 10 00:45:20.705669 systemd-networkd[1169]: lo: Gained carrier May 10 00:45:20.706287 systemd-networkd[1169]: Enumeration completed May 10 00:45:20.706394 systemd[1]: Started systemd-networkd.service. May 10 00:45:20.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:20.710240 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 00:45:20.728212 systemd-networkd[1169]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:45:20.734269 systemd[1]: Finished systemd-udev-settle.service. May 10 00:45:20.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:20.737792 systemd[1]: Starting lvm2-activation-early.service... May 10 00:45:20.783913 kernel: mlx5_core 724b:00:02.0 enP29259s1: Link up May 10 00:45:20.808299 kernel: hv_netvsc 7c1e5237-aabc-7c1e-5237-aabc7c1e5237 eth0: Data path switched to VF: enP29259s1 May 10 00:45:20.808115 systemd-networkd[1169]: enP29259s1: Link UP May 10 00:45:20.808251 systemd-networkd[1169]: eth0: Link UP May 10 00:45:20.808256 systemd-networkd[1169]: eth0: Gained carrier May 10 00:45:20.812199 systemd-networkd[1169]: enP29259s1: Gained carrier May 10 00:45:20.839020 systemd-networkd[1169]: eth0: DHCPv4 address 10.200.8.32/24, gateway 10.200.8.1 acquired from 168.63.129.16 May 10 00:45:20.986359 lvm[1240]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:45:21.024087 systemd[1]: Finished lvm2-activation-early.service. May 10 00:45:21.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:21.027502 systemd[1]: Reached target cryptsetup.target. May 10 00:45:21.031208 systemd[1]: Starting lvm2-activation.service... May 10 00:45:21.037211 lvm[1241]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:45:21.061123 systemd[1]: Finished lvm2-activation.service. May 10 00:45:21.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:21.064712 systemd[1]: Reached target local-fs-pre.target. May 10 00:45:21.067183 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 10 00:45:21.067227 systemd[1]: Reached target local-fs.target. May 10 00:45:21.069401 systemd[1]: Reached target machines.target. May 10 00:45:21.073442 systemd[1]: Starting ldconfig.service... May 10 00:45:21.075841 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:45:21.075956 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:45:21.077176 systemd[1]: Starting systemd-boot-update.service... May 10 00:45:21.080412 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 10 00:45:21.084283 systemd[1]: Starting systemd-machine-id-commit.service... May 10 00:45:21.090902 systemd[1]: Starting systemd-sysext.service... May 10 00:45:21.107486 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1243 (bootctl) May 10 00:45:21.108996 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 10 00:45:21.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:21.547564 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 10 00:45:21.553909 systemd[1]: Unmounting usr-share-oem.mount... May 10 00:45:21.612126 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 10 00:45:21.613912 systemd[1]: Unmounted usr-share-oem.mount. May 10 00:45:21.682920 kernel: loop0: detected capacity change from 0 to 210664 May 10 00:45:21.716153 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 10 00:45:21.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:21.718708 systemd[1]: Finished systemd-machine-id-commit.service. May 10 00:45:21.729084 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 10 00:45:21.745914 kernel: loop1: detected capacity change from 0 to 210664 May 10 00:45:21.757915 (sd-sysext)[1255]: Using extensions 'kubernetes'. May 10 00:45:21.758370 (sd-sysext)[1255]: Merged extensions into '/usr'. May 10 00:45:21.778399 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:45:21.780546 systemd[1]: Mounting usr-share-oem.mount... May 10 00:45:21.784463 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:45:21.789700 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:45:21.794204 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:45:21.799427 systemd[1]: Starting modprobe@loop.service... May 10 00:45:21.802622 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:45:21.803057 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:45:21.803337 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:45:21.807145 systemd[1]: Mounted usr-share-oem.mount. May 10 00:45:21.811041 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:45:21.811199 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:45:21.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:21.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:21.816509 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:45:21.816660 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:45:21.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:21.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:21.820828 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:45:21.821283 systemd[1]: Finished modprobe@loop.service. May 10 00:45:21.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:21.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:21.824744 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:45:21.824902 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:45:21.826140 systemd[1]: Finished systemd-sysext.service. May 10 00:45:21.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:21.830677 systemd[1]: Starting ensure-sysext.service... May 10 00:45:21.834742 systemd[1]: Starting systemd-tmpfiles-setup.service... May 10 00:45:21.841821 systemd[1]: Reloading. May 10 00:45:21.916442 /usr/lib/systemd/system-generators/torcx-generator[1282]: time="2025-05-10T00:45:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:45:21.916481 /usr/lib/systemd/system-generators/torcx-generator[1282]: time="2025-05-10T00:45:21Z" level=info msg="torcx already run" May 10 00:45:21.967028 systemd-networkd[1169]: eth0: Gained IPv6LL May 10 00:45:22.005608 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:45:22.005628 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:45:22.029268 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:45:22.039275 systemd-tmpfiles[1262]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 10 00:45:22.100000 audit: BPF prog-id=27 op=LOAD May 10 00:45:22.101000 audit: BPF prog-id=18 op=UNLOAD May 10 00:45:22.101000 audit: BPF prog-id=28 op=LOAD May 10 00:45:22.101000 audit: BPF prog-id=29 op=LOAD May 10 00:45:22.101000 audit: BPF prog-id=19 op=UNLOAD May 10 00:45:22.101000 audit: BPF prog-id=20 op=UNLOAD May 10 00:45:22.103000 audit: BPF prog-id=30 op=LOAD May 10 00:45:22.104000 audit: BPF prog-id=23 op=UNLOAD May 10 00:45:22.104000 audit: BPF prog-id=31 op=LOAD May 10 00:45:22.104000 audit: BPF prog-id=24 op=UNLOAD May 10 00:45:22.104000 audit: BPF prog-id=32 op=LOAD May 10 00:45:22.104000 audit: BPF prog-id=33 op=LOAD May 10 00:45:22.104000 audit: BPF prog-id=25 op=UNLOAD May 10 00:45:22.104000 audit: BPF prog-id=26 op=UNLOAD May 10 00:45:22.105000 audit: BPF prog-id=34 op=LOAD May 10 00:45:22.105000 audit: BPF prog-id=35 op=LOAD May 10 00:45:22.105000 audit: BPF prog-id=21 op=UNLOAD May 10 00:45:22.105000 audit: BPF prog-id=22 op=UNLOAD May 10 00:45:22.110853 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 00:45:22.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:22.123506 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:45:22.123753 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:45:22.125166 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:45:22.127690 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:45:22.130467 systemd[1]: Starting modprobe@loop.service... May 10 00:45:22.131539 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:45:22.131703 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:45:22.131897 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:45:22.133859 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:45:22.134280 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:45:22.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:22.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:22.140520 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:45:22.140905 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:45:22.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:22.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:22.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:22.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:22.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:22.142414 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:45:22.142535 systemd[1]: Finished modprobe@loop.service. May 10 00:45:22.144125 systemd[1]: Finished ensure-sysext.service. May 10 00:45:22.145104 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:45:22.145331 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:45:22.147190 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:45:22.152273 systemd[1]: Starting modprobe@drm.service... May 10 00:45:22.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:22.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:22.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:22.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:22.153480 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:45:22.153528 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:45:22.153573 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:45:22.153628 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:45:22.154009 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:45:22.154131 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:45:22.155327 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:45:22.155431 systemd[1]: Finished modprobe@drm.service. May 10 00:45:22.155696 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:45:22.194913 systemd-tmpfiles[1262]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 10 00:45:22.198375 systemd-fsck[1251]: fsck.fat 4.2 (2021-01-31) May 10 00:45:22.198375 systemd-fsck[1251]: /dev/sda1: 790 files, 120688/258078 clusters May 10 00:45:22.200439 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 10 00:45:22.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:22.205302 systemd[1]: Mounting boot.mount... May 10 00:45:22.216546 systemd[1]: Mounted boot.mount. May 10 00:45:22.230487 systemd[1]: Finished systemd-boot-update.service. May 10 00:45:22.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:22.286249 systemd-tmpfiles[1262]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 10 00:45:22.883983 systemd[1]: Finished systemd-tmpfiles-setup.service. May 10 00:45:22.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:22.888353 systemd[1]: Starting audit-rules.service... May 10 00:45:22.891470 systemd[1]: Starting clean-ca-certificates.service... May 10 00:45:22.894913 systemd[1]: Starting systemd-journal-catalog-update.service... May 10 00:45:22.896000 audit: BPF prog-id=36 op=LOAD May 10 00:45:22.899437 systemd[1]: Starting systemd-resolved.service... May 10 00:45:22.901000 audit: BPF prog-id=37 op=LOAD May 10 00:45:22.904281 systemd[1]: Starting systemd-timesyncd.service... May 10 00:45:22.909461 systemd[1]: Starting systemd-update-utmp.service... May 10 00:45:22.920000 audit[1359]: SYSTEM_BOOT pid=1359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 10 00:45:22.923824 systemd[1]: Finished systemd-update-utmp.service. May 10 00:45:22.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:22.951273 systemd[1]: Finished clean-ca-certificates.service. May 10 00:45:22.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:22.953631 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:45:23.004432 systemd[1]: Finished systemd-journal-catalog-update.service. May 10 00:45:23.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:23.020344 systemd[1]: Started systemd-timesyncd.service. May 10 00:45:23.022570 systemd[1]: Reached target time-set.target. May 10 00:45:23.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:23.077515 systemd-resolved[1357]: Positive Trust Anchors: May 10 00:45:23.077537 systemd-resolved[1357]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:45:23.077576 systemd-resolved[1357]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:45:23.141676 systemd-timesyncd[1358]: Contacted time server 193.1.12.167:123 (0.flatcar.pool.ntp.org). May 10 00:45:23.141834 systemd-timesyncd[1358]: Initial clock synchronization to Sat 2025-05-10 00:45:23.142753 UTC. May 10 00:45:23.160000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 10 00:45:23.160000 audit[1375]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeb29bbd70 a2=420 a3=0 items=0 ppid=1354 pid=1375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:23.160000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 10 00:45:23.162444 augenrules[1375]: No rules May 10 00:45:23.162980 systemd[1]: Finished audit-rules.service. May 10 00:45:23.171909 systemd-resolved[1357]: Using system hostname 'ci-3510.3.7-n-a3a45e53be'. May 10 00:45:23.173965 systemd[1]: Started systemd-resolved.service. May 10 00:45:23.176337 systemd[1]: Reached target network.target. May 10 00:45:23.178303 systemd[1]: Reached target network-online.target. May 10 00:45:23.180341 systemd[1]: Reached target nss-lookup.target. May 10 00:45:27.251073 ldconfig[1242]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 10 00:45:27.262194 systemd[1]: Finished ldconfig.service. May 10 00:45:27.266861 systemd[1]: Starting systemd-update-done.service... May 10 00:45:27.278569 systemd[1]: Finished systemd-update-done.service. May 10 00:45:27.280947 systemd[1]: Reached target sysinit.target. May 10 00:45:27.283945 systemd[1]: Started motdgen.path. May 10 00:45:27.286554 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 10 00:45:27.290274 systemd[1]: Started logrotate.timer. May 10 00:45:27.292720 systemd[1]: Started mdadm.timer. May 10 00:45:27.294379 systemd[1]: Started systemd-tmpfiles-clean.timer. May 10 00:45:27.296423 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 00:45:27.296465 systemd[1]: Reached target paths.target. May 10 00:45:27.298212 systemd[1]: Reached target timers.target. May 10 00:45:27.300524 systemd[1]: Listening on dbus.socket. May 10 00:45:27.303412 systemd[1]: Starting docker.socket... May 10 00:45:27.319692 systemd[1]: Listening on sshd.socket. May 10 00:45:27.323391 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:45:27.324094 systemd[1]: Listening on docker.socket. May 10 00:45:27.327243 systemd[1]: Reached target sockets.target. May 10 00:45:27.330199 systemd[1]: Reached target basic.target. May 10 00:45:27.332839 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:45:27.332874 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:45:27.336247 systemd[1]: Starting containerd.service... May 10 00:45:27.342632 systemd[1]: Starting dbus.service... May 10 00:45:27.346620 systemd[1]: Starting enable-oem-cloudinit.service... May 10 00:45:27.351946 systemd[1]: Starting extend-filesystems.service... May 10 00:45:27.354785 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 10 00:45:27.377170 systemd[1]: Starting kubelet.service... May 10 00:45:27.381676 systemd[1]: Starting motdgen.service... May 10 00:45:27.385732 systemd[1]: Started nvidia.service. May 10 00:45:27.388991 systemd[1]: Starting ssh-key-proc-cmdline.service... May 10 00:45:27.392159 systemd[1]: Starting sshd-keygen.service... May 10 00:45:27.397602 systemd[1]: Starting systemd-logind.service... May 10 00:45:27.400983 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:45:27.401080 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 10 00:45:27.401639 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 10 00:45:27.404103 systemd[1]: Starting update-engine.service... May 10 00:45:27.410663 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 10 00:45:27.417421 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 10 00:45:27.417684 systemd[1]: Finished ssh-key-proc-cmdline.service. May 10 00:45:27.428303 jq[1385]: false May 10 00:45:27.428616 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 10 00:45:27.429029 jq[1400]: true May 10 00:45:27.428822 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 10 00:45:27.451861 jq[1404]: true May 10 00:45:27.465406 extend-filesystems[1386]: Found loop1 May 10 00:45:27.469019 extend-filesystems[1386]: Found sda May 10 00:45:27.471217 extend-filesystems[1386]: Found sda1 May 10 00:45:27.471217 extend-filesystems[1386]: Found sda2 May 10 00:45:27.471217 extend-filesystems[1386]: Found sda3 May 10 00:45:27.471217 extend-filesystems[1386]: Found usr May 10 00:45:27.471217 extend-filesystems[1386]: Found sda4 May 10 00:45:27.471217 extend-filesystems[1386]: Found sda6 May 10 00:45:27.471217 extend-filesystems[1386]: Found sda7 May 10 00:45:27.471217 extend-filesystems[1386]: Found sda9 May 10 00:45:27.471217 extend-filesystems[1386]: Checking size of /dev/sda9 May 10 00:45:27.512312 systemd[1]: motdgen.service: Deactivated successfully. May 10 00:45:27.512510 systemd[1]: Finished motdgen.service. May 10 00:45:27.537022 env[1406]: time="2025-05-10T00:45:27.536973775Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 10 00:45:27.546903 extend-filesystems[1386]: Old size kept for /dev/sda9 May 10 00:45:27.546903 extend-filesystems[1386]: Found sr0 May 10 00:45:27.550594 systemd[1]: extend-filesystems.service: Deactivated successfully. May 10 00:45:27.550762 systemd[1]: Finished extend-filesystems.service. May 10 00:45:27.570284 systemd-logind[1395]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 10 00:45:27.571770 systemd-logind[1395]: New seat seat0. May 10 00:45:27.578095 dbus-daemon[1384]: [system] SELinux support is enabled May 10 00:45:27.578265 systemd[1]: Started dbus.service. May 10 00:45:27.582945 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 10 00:45:27.582979 systemd[1]: Reached target system-config.target. May 10 00:45:27.585447 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 10 00:45:27.585477 systemd[1]: Reached target user-config.target. May 10 00:45:27.589133 systemd[1]: Started systemd-logind.service. May 10 00:45:27.589207 dbus-daemon[1384]: [system] Successfully activated service 'org.freedesktop.systemd1' May 10 00:45:27.621363 env[1406]: time="2025-05-10T00:45:27.620835284Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 10 00:45:27.623914 env[1406]: time="2025-05-10T00:45:27.623082421Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 10 00:45:27.625589 env[1406]: time="2025-05-10T00:45:27.624652116Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 10 00:45:27.625589 env[1406]: time="2025-05-10T00:45:27.624692719Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 10 00:45:27.625589 env[1406]: time="2025-05-10T00:45:27.624970436Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:45:27.625589 env[1406]: time="2025-05-10T00:45:27.624995037Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 10 00:45:27.625589 env[1406]: time="2025-05-10T00:45:27.625014439Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 10 00:45:27.625589 env[1406]: time="2025-05-10T00:45:27.625030139Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 10 00:45:27.625589 env[1406]: time="2025-05-10T00:45:27.625128745Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 10 00:45:27.625589 env[1406]: time="2025-05-10T00:45:27.625371160Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 10 00:45:27.625589 env[1406]: time="2025-05-10T00:45:27.625551171Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:45:27.625589 env[1406]: time="2025-05-10T00:45:27.625573273Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 10 00:45:27.625993 env[1406]: time="2025-05-10T00:45:27.625630676Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 10 00:45:27.625993 env[1406]: time="2025-05-10T00:45:27.625647277Z" level=info msg="metadata content store policy set" policy=shared May 10 00:45:27.653242 env[1406]: time="2025-05-10T00:45:27.649438226Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 10 00:45:27.653242 env[1406]: time="2025-05-10T00:45:27.649492030Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 10 00:45:27.653242 env[1406]: time="2025-05-10T00:45:27.649512131Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 10 00:45:27.653242 env[1406]: time="2025-05-10T00:45:27.649638639Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 10 00:45:27.653242 env[1406]: time="2025-05-10T00:45:27.649666940Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 10 00:45:27.653242 env[1406]: time="2025-05-10T00:45:27.649686742Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 10 00:45:27.653242 env[1406]: time="2025-05-10T00:45:27.649705343Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 10 00:45:27.653242 env[1406]: time="2025-05-10T00:45:27.649724044Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 10 00:45:27.653242 env[1406]: time="2025-05-10T00:45:27.649752146Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 10 00:45:27.653242 env[1406]: time="2025-05-10T00:45:27.649772447Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 10 00:45:27.653242 env[1406]: time="2025-05-10T00:45:27.649790948Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 10 00:45:27.653242 env[1406]: time="2025-05-10T00:45:27.649808549Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 10 00:45:27.653242 env[1406]: time="2025-05-10T00:45:27.649958558Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 10 00:45:27.653242 env[1406]: time="2025-05-10T00:45:27.650070665Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 10 00:45:27.653818 env[1406]: time="2025-05-10T00:45:27.650384184Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 10 00:45:27.653818 env[1406]: time="2025-05-10T00:45:27.650415086Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 10 00:45:27.653818 env[1406]: time="2025-05-10T00:45:27.650433887Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 10 00:45:27.653818 env[1406]: time="2025-05-10T00:45:27.650485890Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 10 00:45:27.653818 env[1406]: time="2025-05-10T00:45:27.650504891Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 10 00:45:27.653818 env[1406]: time="2025-05-10T00:45:27.650524693Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 10 00:45:27.653818 env[1406]: time="2025-05-10T00:45:27.650541494Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 10 00:45:27.653818 env[1406]: time="2025-05-10T00:45:27.650559095Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 10 00:45:27.653818 env[1406]: time="2025-05-10T00:45:27.650576496Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 10 00:45:27.653818 env[1406]: time="2025-05-10T00:45:27.650593497Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 10 00:45:27.653818 env[1406]: time="2025-05-10T00:45:27.650611198Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 10 00:45:27.653818 env[1406]: time="2025-05-10T00:45:27.650631799Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 10 00:45:27.653818 env[1406]: time="2025-05-10T00:45:27.650760607Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 10 00:45:27.653818 env[1406]: time="2025-05-10T00:45:27.652467011Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 10 00:45:27.653818 env[1406]: time="2025-05-10T00:45:27.652489712Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 10 00:45:27.659761 env[1406]: time="2025-05-10T00:45:27.652517114Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 10 00:45:27.659761 env[1406]: time="2025-05-10T00:45:27.652540815Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 10 00:45:27.659761 env[1406]: time="2025-05-10T00:45:27.652560217Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 10 00:45:27.659761 env[1406]: time="2025-05-10T00:45:27.652585218Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 10 00:45:27.659761 env[1406]: time="2025-05-10T00:45:27.652629421Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 10 00:45:27.658246 systemd[1]: Started containerd.service. May 10 00:45:27.659986 env[1406]: time="2025-05-10T00:45:27.656966885Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 10 00:45:27.659986 env[1406]: time="2025-05-10T00:45:27.657051990Z" level=info msg="Connect containerd service" May 10 00:45:27.659986 env[1406]: time="2025-05-10T00:45:27.657100293Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 10 00:45:27.659986 env[1406]: time="2025-05-10T00:45:27.657721231Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:45:27.659986 env[1406]: time="2025-05-10T00:45:27.658056051Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 10 00:45:27.659986 env[1406]: time="2025-05-10T00:45:27.658107855Z" level=info msg=serving... address=/run/containerd/containerd.sock May 10 00:45:27.690319 env[1406]: time="2025-05-10T00:45:27.661822281Z" level=info msg="Start subscribing containerd event" May 10 00:45:27.690319 env[1406]: time="2025-05-10T00:45:27.677976665Z" level=info msg="Start recovering state" May 10 00:45:27.690319 env[1406]: time="2025-05-10T00:45:27.678107873Z" level=info msg="Start event monitor" May 10 00:45:27.690319 env[1406]: time="2025-05-10T00:45:27.678138275Z" level=info msg="Start snapshots syncer" May 10 00:45:27.690319 env[1406]: time="2025-05-10T00:45:27.678158276Z" level=info msg="Start cni network conf syncer for default" May 10 00:45:27.690319 env[1406]: time="2025-05-10T00:45:27.678182378Z" level=info msg="Start streaming server" May 10 00:45:27.690319 env[1406]: time="2025-05-10T00:45:27.678342487Z" level=info msg="containerd successfully booted in 0.142322s" May 10 00:45:27.700978 bash[1439]: Updated "/home/core/.ssh/authorized_keys" May 10 00:45:27.701604 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 10 00:45:27.756223 systemd[1]: nvidia.service: Deactivated successfully. May 10 00:45:28.155389 update_engine[1396]: I0510 00:45:28.154670 1396 main.cc:92] Flatcar Update Engine starting May 10 00:45:28.217805 systemd[1]: Started update-engine.service. May 10 00:45:28.222090 update_engine[1396]: I0510 00:45:28.217859 1396 update_check_scheduler.cc:74] Next update check in 10m25s May 10 00:45:28.222775 systemd[1]: Started locksmithd.service. May 10 00:45:28.677052 sshd_keygen[1405]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 10 00:45:28.704939 systemd[1]: Finished sshd-keygen.service. May 10 00:45:28.708971 systemd[1]: Starting issuegen.service... May 10 00:45:28.712647 systemd[1]: Started waagent.service. May 10 00:45:28.726627 systemd[1]: issuegen.service: Deactivated successfully. May 10 00:45:28.726807 systemd[1]: Finished issuegen.service. May 10 00:45:28.731796 systemd[1]: Starting systemd-user-sessions.service... May 10 00:45:28.742119 systemd[1]: Finished systemd-user-sessions.service. May 10 00:45:28.750134 systemd[1]: Started getty@tty1.service. May 10 00:45:28.753711 systemd[1]: Started serial-getty@ttyS0.service. May 10 00:45:28.756120 systemd[1]: Reached target getty.target. May 10 00:45:28.760993 systemd[1]: Started kubelet.service. May 10 00:45:28.763365 systemd[1]: Reached target multi-user.target. May 10 00:45:28.767231 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 10 00:45:28.778662 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 10 00:45:28.778858 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 10 00:45:28.781429 systemd[1]: Startup finished in 935ms (firmware) + 23.165s (loader) + 1.129s (kernel) + 11.570s (initrd) + 19.824s (userspace) = 56.625s. May 10 00:45:29.171962 login[1502]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 10 00:45:29.173479 login[1503]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 10 00:45:29.196233 systemd[1]: Created slice user-500.slice. May 10 00:45:29.197822 systemd[1]: Starting user-runtime-dir@500.service... May 10 00:45:29.211678 systemd-logind[1395]: New session 1 of user core. May 10 00:45:29.216635 systemd-logind[1395]: New session 2 of user core. May 10 00:45:29.222613 systemd[1]: Finished user-runtime-dir@500.service. May 10 00:45:29.224404 systemd[1]: Starting user@500.service... May 10 00:45:29.241504 (systemd)[1512]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:29.408341 systemd[1512]: Queued start job for default target default.target. May 10 00:45:29.409849 systemd[1512]: Reached target paths.target. May 10 00:45:29.410064 systemd[1512]: Reached target sockets.target. May 10 00:45:29.410178 systemd[1512]: Reached target timers.target. May 10 00:45:29.410243 systemd[1512]: Reached target basic.target. May 10 00:45:29.410439 systemd[1]: Started user@500.service. May 10 00:45:29.411512 systemd[1]: Started session-1.scope. May 10 00:45:29.411964 systemd[1512]: Reached target default.target. May 10 00:45:29.412012 systemd[1512]: Startup finished in 162ms. May 10 00:45:29.412106 systemd[1]: Started session-2.scope. May 10 00:45:29.540161 kubelet[1505]: E0510 00:45:29.540109 1505 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:45:29.541872 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:45:29.542048 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:45:29.542314 systemd[1]: kubelet.service: Consumed 1.077s CPU time. May 10 00:45:29.608942 locksmithd[1483]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 10 00:45:34.717597 waagent[1496]: 2025-05-10T00:45:34.717475Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 May 10 00:45:34.720712 waagent[1496]: 2025-05-10T00:45:34.719866Z INFO Daemon Daemon OS: flatcar 3510.3.7 May 10 00:45:34.724741 waagent[1496]: 2025-05-10T00:45:34.723754Z INFO Daemon Daemon Python: 3.9.16 May 10 00:45:34.728799 waagent[1496]: 2025-05-10T00:45:34.728721Z INFO Daemon Daemon Run daemon May 10 00:45:34.731666 waagent[1496]: 2025-05-10T00:45:34.731602Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.7' May 10 00:45:34.749358 waagent[1496]: 2025-05-10T00:45:34.749231Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 10 00:45:34.758940 waagent[1496]: 2025-05-10T00:45:34.758798Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 10 00:45:34.765411 waagent[1496]: 2025-05-10T00:45:34.765326Z INFO Daemon Daemon cloud-init is enabled: False May 10 00:45:34.768908 waagent[1496]: 2025-05-10T00:45:34.768824Z INFO Daemon Daemon Using waagent for provisioning May 10 00:45:34.817088 waagent[1496]: 2025-05-10T00:45:34.769691Z INFO Daemon Daemon Activate resource disk May 10 00:45:34.817088 waagent[1496]: 2025-05-10T00:45:34.769919Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb May 10 00:45:34.817088 waagent[1496]: 2025-05-10T00:45:34.784749Z INFO Daemon Daemon Found device: None May 10 00:45:34.817088 waagent[1496]: 2025-05-10T00:45:34.785928Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology May 10 00:45:34.817088 waagent[1496]: 2025-05-10T00:45:34.786802Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 May 10 00:45:34.817088 waagent[1496]: 2025-05-10T00:45:34.792485Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 10 00:45:34.817088 waagent[1496]: 2025-05-10T00:45:34.797496Z INFO Daemon Daemon Running default provisioning handler May 10 00:45:34.820261 waagent[1496]: 2025-05-10T00:45:34.820098Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 10 00:45:34.831793 waagent[1496]: 2025-05-10T00:45:34.831645Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 10 00:45:34.838109 waagent[1496]: 2025-05-10T00:45:34.838015Z INFO Daemon Daemon cloud-init is enabled: False May 10 00:45:34.841979 waagent[1496]: 2025-05-10T00:45:34.841892Z INFO Daemon Daemon Copying ovf-env.xml May 10 00:45:34.902388 waagent[1496]: 2025-05-10T00:45:34.897986Z INFO Daemon Daemon Successfully mounted dvd May 10 00:45:34.965003 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. May 10 00:45:34.981920 waagent[1496]: 2025-05-10T00:45:34.981702Z INFO Daemon Daemon Detect protocol endpoint May 10 00:45:34.987622 waagent[1496]: 2025-05-10T00:45:34.982219Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 10 00:45:34.987622 waagent[1496]: 2025-05-10T00:45:34.983443Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler May 10 00:45:34.987622 waagent[1496]: 2025-05-10T00:45:34.984248Z INFO Daemon Daemon Test for route to 168.63.129.16 May 10 00:45:34.987622 waagent[1496]: 2025-05-10T00:45:34.985307Z INFO Daemon Daemon Route to 168.63.129.16 exists May 10 00:45:34.987622 waagent[1496]: 2025-05-10T00:45:34.985990Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 May 10 00:45:35.177954 waagent[1496]: 2025-05-10T00:45:35.176820Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 May 10 00:45:35.182140 waagent[1496]: 2025-05-10T00:45:35.180808Z INFO Daemon Daemon Wire protocol version:2012-11-30 May 10 00:45:35.183726 waagent[1496]: 2025-05-10T00:45:35.183652Z INFO Daemon Daemon Server preferred version:2015-04-05 May 10 00:45:35.386677 waagent[1496]: 2025-05-10T00:45:35.386526Z INFO Daemon Daemon Initializing goal state during protocol detection May 10 00:45:35.398329 waagent[1496]: 2025-05-10T00:45:35.398249Z INFO Daemon Daemon Forcing an update of the goal state.. May 10 00:45:35.401334 waagent[1496]: 2025-05-10T00:45:35.401267Z INFO Daemon Daemon Fetching goal state [incarnation 1] May 10 00:45:35.480020 waagent[1496]: 2025-05-10T00:45:35.479888Z INFO Daemon Daemon Found private key matching thumbprint FDA9A69EDEA39DBDA88831DB274B4B4E8823676D May 10 00:45:35.489896 waagent[1496]: 2025-05-10T00:45:35.480357Z INFO Daemon Daemon Certificate with thumbprint 28E820376BA9533A8CA6D0236F26FF5584185D63 has no matching private key. May 10 00:45:35.489896 waagent[1496]: 2025-05-10T00:45:35.481790Z INFO Daemon Daemon Fetch goal state completed May 10 00:45:35.505194 waagent[1496]: 2025-05-10T00:45:35.505123Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: eeb7958c-cd16-4d38-b2ec-7afa26fe7072 New eTag: 15247119934019385744] May 10 00:45:35.505952 waagent[1496]: 2025-05-10T00:45:35.505866Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob May 10 00:45:35.518392 waagent[1496]: 2025-05-10T00:45:35.518328Z INFO Daemon Daemon Starting provisioning May 10 00:45:35.525887 waagent[1496]: 2025-05-10T00:45:35.518621Z INFO Daemon Daemon Handle ovf-env.xml. May 10 00:45:35.525887 waagent[1496]: 2025-05-10T00:45:35.519671Z INFO Daemon Daemon Set hostname [ci-3510.3.7-n-a3a45e53be] May 10 00:45:35.535921 waagent[1496]: 2025-05-10T00:45:35.535782Z INFO Daemon Daemon Publish hostname [ci-3510.3.7-n-a3a45e53be] May 10 00:45:35.544294 waagent[1496]: 2025-05-10T00:45:35.536484Z INFO Daemon Daemon Examine /proc/net/route for primary interface May 10 00:45:35.544294 waagent[1496]: 2025-05-10T00:45:35.537668Z INFO Daemon Daemon Primary interface is [eth0] May 10 00:45:35.551602 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. May 10 00:45:35.551855 systemd[1]: Stopped systemd-networkd-wait-online.service. May 10 00:45:35.551950 systemd[1]: Stopping systemd-networkd-wait-online.service... May 10 00:45:35.552317 systemd[1]: Stopping systemd-networkd.service... May 10 00:45:35.557925 systemd-networkd[1169]: eth0: DHCPv6 lease lost May 10 00:45:35.559303 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 00:45:35.559500 systemd[1]: Stopped systemd-networkd.service. May 10 00:45:35.562129 systemd[1]: Starting systemd-networkd.service... May 10 00:45:35.594390 systemd-networkd[1554]: enP29259s1: Link UP May 10 00:45:35.594401 systemd-networkd[1554]: enP29259s1: Gained carrier May 10 00:45:35.595717 systemd-networkd[1554]: eth0: Link UP May 10 00:45:35.595726 systemd-networkd[1554]: eth0: Gained carrier May 10 00:45:35.596181 systemd-networkd[1554]: lo: Link UP May 10 00:45:35.596190 systemd-networkd[1554]: lo: Gained carrier May 10 00:45:35.596507 systemd-networkd[1554]: eth0: Gained IPv6LL May 10 00:45:35.596791 systemd-networkd[1554]: Enumeration completed May 10 00:45:35.596971 systemd[1]: Started systemd-networkd.service. May 10 00:45:35.599648 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 00:45:35.607312 waagent[1496]: 2025-05-10T00:45:35.600680Z INFO Daemon Daemon Create user account if not exists May 10 00:45:35.607312 waagent[1496]: 2025-05-10T00:45:35.603987Z INFO Daemon Daemon User core already exists, skip useradd May 10 00:45:35.607312 waagent[1496]: 2025-05-10T00:45:35.607177Z INFO Daemon Daemon Configure sudoer May 10 00:45:35.608007 systemd-networkd[1554]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:45:35.610115 waagent[1496]: 2025-05-10T00:45:35.610045Z INFO Daemon Daemon Configure sshd May 10 00:45:35.614168 waagent[1496]: 2025-05-10T00:45:35.610327Z INFO Daemon Daemon Deploy ssh public key. May 10 00:45:35.649966 systemd-networkd[1554]: eth0: DHCPv4 address 10.200.8.32/24, gateway 10.200.8.1 acquired from 168.63.129.16 May 10 00:45:35.653156 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 00:45:36.724436 waagent[1496]: 2025-05-10T00:45:36.724314Z INFO Daemon Daemon Provisioning complete May 10 00:45:36.742730 waagent[1496]: 2025-05-10T00:45:36.742637Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping May 10 00:45:36.747221 waagent[1496]: 2025-05-10T00:45:36.747129Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. May 10 00:45:36.755276 waagent[1496]: 2025-05-10T00:45:36.755192Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent May 10 00:45:37.029628 waagent[1563]: 2025-05-10T00:45:37.029521Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent May 10 00:45:37.030421 waagent[1563]: 2025-05-10T00:45:37.030354Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 10 00:45:37.030567 waagent[1563]: 2025-05-10T00:45:37.030510Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 10 00:45:37.041595 waagent[1563]: 2025-05-10T00:45:37.041521Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. May 10 00:45:37.041761 waagent[1563]: 2025-05-10T00:45:37.041710Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] May 10 00:45:37.110911 waagent[1563]: 2025-05-10T00:45:37.110773Z INFO ExtHandler ExtHandler Found private key matching thumbprint FDA9A69EDEA39DBDA88831DB274B4B4E8823676D May 10 00:45:37.111160 waagent[1563]: 2025-05-10T00:45:37.111099Z INFO ExtHandler ExtHandler Certificate with thumbprint 28E820376BA9533A8CA6D0236F26FF5584185D63 has no matching private key. May 10 00:45:37.111390 waagent[1563]: 2025-05-10T00:45:37.111340Z INFO ExtHandler ExtHandler Fetch goal state completed May 10 00:45:37.125471 waagent[1563]: 2025-05-10T00:45:37.125406Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: a12bf001-94e7-49f6-8d71-f946573532ba New eTag: 15247119934019385744] May 10 00:45:37.126034 waagent[1563]: 2025-05-10T00:45:37.125977Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob May 10 00:45:37.186078 waagent[1563]: 2025-05-10T00:45:37.185933Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; May 10 00:45:37.209674 waagent[1563]: 2025-05-10T00:45:37.209570Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1563 May 10 00:45:37.214048 waagent[1563]: 2025-05-10T00:45:37.213965Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 10 00:45:37.215453 waagent[1563]: 2025-05-10T00:45:37.215377Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules May 10 00:45:37.306589 waagent[1563]: 2025-05-10T00:45:37.306452Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 10 00:45:37.307202 waagent[1563]: 2025-05-10T00:45:37.306970Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 10 00:45:37.319501 waagent[1563]: 2025-05-10T00:45:37.319436Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 10 00:45:37.320045 waagent[1563]: 2025-05-10T00:45:37.319958Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 10 00:45:37.322939 waagent[1563]: 2025-05-10T00:45:37.322855Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] May 10 00:45:37.324699 waagent[1563]: 2025-05-10T00:45:37.324634Z INFO ExtHandler ExtHandler Starting env monitor service. May 10 00:45:37.325278 waagent[1563]: 2025-05-10T00:45:37.325219Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 10 00:45:37.325432 waagent[1563]: 2025-05-10T00:45:37.325384Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 10 00:45:37.325962 waagent[1563]: 2025-05-10T00:45:37.325906Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 10 00:45:37.326248 waagent[1563]: 2025-05-10T00:45:37.326191Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 10 00:45:37.326248 waagent[1563]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 10 00:45:37.326248 waagent[1563]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 May 10 00:45:37.326248 waagent[1563]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 10 00:45:37.326248 waagent[1563]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 10 00:45:37.326248 waagent[1563]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 10 00:45:37.326248 waagent[1563]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 10 00:45:37.330637 waagent[1563]: 2025-05-10T00:45:37.330438Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 10 00:45:37.331586 waagent[1563]: 2025-05-10T00:45:37.331507Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 10 00:45:37.331803 waagent[1563]: 2025-05-10T00:45:37.331749Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 10 00:45:37.332535 waagent[1563]: 2025-05-10T00:45:37.332471Z INFO EnvHandler ExtHandler Configure routes May 10 00:45:37.332692 waagent[1563]: 2025-05-10T00:45:37.332641Z INFO EnvHandler ExtHandler Gateway:None May 10 00:45:37.332825 waagent[1563]: 2025-05-10T00:45:37.332780Z INFO EnvHandler ExtHandler Routes:None May 10 00:45:37.333802 waagent[1563]: 2025-05-10T00:45:37.333743Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 10 00:45:37.333989 waagent[1563]: 2025-05-10T00:45:37.333929Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 10 00:45:37.334648 waagent[1563]: 2025-05-10T00:45:37.334511Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 10 00:45:37.335136 waagent[1563]: 2025-05-10T00:45:37.335073Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 10 00:45:37.336014 waagent[1563]: 2025-05-10T00:45:37.335944Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 10 00:45:37.345393 waagent[1563]: 2025-05-10T00:45:37.345321Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) May 10 00:45:37.347277 waagent[1563]: 2025-05-10T00:45:37.347228Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 10 00:45:37.349773 waagent[1563]: 2025-05-10T00:45:37.349716Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' May 10 00:45:37.369857 waagent[1563]: 2025-05-10T00:45:37.369775Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1554' May 10 00:45:37.390507 waagent[1563]: 2025-05-10T00:45:37.390438Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. May 10 00:45:37.443806 waagent[1563]: 2025-05-10T00:45:37.443405Z INFO MonitorHandler ExtHandler Network interfaces: May 10 00:45:37.443806 waagent[1563]: Executing ['ip', '-a', '-o', 'link']: May 10 00:45:37.443806 waagent[1563]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 10 00:45:37.443806 waagent[1563]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:37:aa:bc brd ff:ff:ff:ff:ff:ff May 10 00:45:37.443806 waagent[1563]: 3: enP29259s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:37:aa:bc brd ff:ff:ff:ff:ff:ff\ altname enP29259p0s2 May 10 00:45:37.443806 waagent[1563]: Executing ['ip', '-4', '-a', '-o', 'address']: May 10 00:45:37.443806 waagent[1563]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 10 00:45:37.443806 waagent[1563]: 2: eth0 inet 10.200.8.32/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever May 10 00:45:37.443806 waagent[1563]: Executing ['ip', '-6', '-a', '-o', 'address']: May 10 00:45:37.443806 waagent[1563]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 10 00:45:37.443806 waagent[1563]: 2: eth0 inet6 fe80::7e1e:52ff:fe37:aabc/64 scope link \ valid_lft forever preferred_lft forever May 10 00:45:37.662283 waagent[1563]: 2025-05-10T00:45:37.662110Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules May 10 00:45:37.665982 waagent[1563]: 2025-05-10T00:45:37.665839Z INFO EnvHandler ExtHandler Firewall rules: May 10 00:45:37.665982 waagent[1563]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 10 00:45:37.665982 waagent[1563]: pkts bytes target prot opt in out source destination May 10 00:45:37.665982 waagent[1563]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 10 00:45:37.665982 waagent[1563]: pkts bytes target prot opt in out source destination May 10 00:45:37.665982 waagent[1563]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 10 00:45:37.665982 waagent[1563]: pkts bytes target prot opt in out source destination May 10 00:45:37.665982 waagent[1563]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 10 00:45:37.665982 waagent[1563]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW May 10 00:45:37.667989 waagent[1563]: 2025-05-10T00:45:37.667928Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 May 10 00:45:37.674117 waagent[1563]: 2025-05-10T00:45:37.674057Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.13.1.1 -- exiting May 10 00:45:37.765165 waagent[1496]: 2025-05-10T00:45:37.765050Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running May 10 00:45:37.769366 waagent[1496]: 2025-05-10T00:45:37.769310Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.13.1.1 to be the latest agent May 10 00:45:38.818534 waagent[1602]: 2025-05-10T00:45:38.818426Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.13.1.1) May 10 00:45:38.819804 waagent[1602]: 2025-05-10T00:45:38.819735Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.7 May 10 00:45:38.819968 waagent[1602]: 2025-05-10T00:45:38.819910Z INFO ExtHandler ExtHandler Python: 3.9.16 May 10 00:45:38.820117 waagent[1602]: 2025-05-10T00:45:38.820071Z INFO ExtHandler ExtHandler CPU Arch: x86_64 May 10 00:45:38.835811 waagent[1602]: 2025-05-10T00:45:38.835701Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; May 10 00:45:38.836243 waagent[1602]: 2025-05-10T00:45:38.836181Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 10 00:45:38.836411 waagent[1602]: 2025-05-10T00:45:38.836361Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 10 00:45:38.836628 waagent[1602]: 2025-05-10T00:45:38.836579Z INFO ExtHandler ExtHandler Initializing the goal state... May 10 00:45:38.848664 waagent[1602]: 2025-05-10T00:45:38.848584Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] May 10 00:45:38.857201 waagent[1602]: 2025-05-10T00:45:38.857137Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.164 May 10 00:45:38.858154 waagent[1602]: 2025-05-10T00:45:38.858094Z INFO ExtHandler May 10 00:45:38.858304 waagent[1602]: 2025-05-10T00:45:38.858253Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 6f777428-8ee9-4e18-b367-5055602a2ec3 eTag: 15247119934019385744 source: Fabric] May 10 00:45:38.859011 waagent[1602]: 2025-05-10T00:45:38.858954Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. May 10 00:45:38.860091 waagent[1602]: 2025-05-10T00:45:38.860033Z INFO ExtHandler May 10 00:45:38.860226 waagent[1602]: 2025-05-10T00:45:38.860176Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] May 10 00:45:38.867597 waagent[1602]: 2025-05-10T00:45:38.867548Z INFO ExtHandler ExtHandler Downloading artifacts profile blob May 10 00:45:38.868033 waagent[1602]: 2025-05-10T00:45:38.867986Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 10 00:45:38.891401 waagent[1602]: 2025-05-10T00:45:38.891333Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. May 10 00:45:38.959313 waagent[1602]: 2025-05-10T00:45:38.959183Z INFO ExtHandler Downloaded certificate {'thumbprint': 'FDA9A69EDEA39DBDA88831DB274B4B4E8823676D', 'hasPrivateKey': True} May 10 00:45:38.960272 waagent[1602]: 2025-05-10T00:45:38.960207Z INFO ExtHandler Downloaded certificate {'thumbprint': '28E820376BA9533A8CA6D0236F26FF5584185D63', 'hasPrivateKey': False} May 10 00:45:38.961279 waagent[1602]: 2025-05-10T00:45:38.961219Z INFO ExtHandler Fetch goal state from WireServer completed May 10 00:45:38.962069 waagent[1602]: 2025-05-10T00:45:38.962013Z INFO ExtHandler ExtHandler Goal state initialization completed. May 10 00:45:38.978708 waagent[1602]: 2025-05-10T00:45:38.978591Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) May 10 00:45:38.987321 waagent[1602]: 2025-05-10T00:45:38.987218Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 10 00:45:38.991056 waagent[1602]: 2025-05-10T00:45:38.990953Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] May 10 00:45:38.991266 waagent[1602]: 2025-05-10T00:45:38.991214Z INFO ExtHandler ExtHandler Checking state of the firewall May 10 00:45:39.021386 waagent[1602]: 2025-05-10T00:45:39.021260Z WARNING ExtHandler ExtHandler The firewall rules for Azure Fabric are not setup correctly (the environment thread will fix it): The following rules are missing: ['ACCEPT DNS'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n']. Current state: May 10 00:45:39.021386 waagent[1602]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 10 00:45:39.021386 waagent[1602]: pkts bytes target prot opt in out source destination May 10 00:45:39.021386 waagent[1602]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 10 00:45:39.021386 waagent[1602]: pkts bytes target prot opt in out source destination May 10 00:45:39.021386 waagent[1602]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 10 00:45:39.021386 waagent[1602]: pkts bytes target prot opt in out source destination May 10 00:45:39.021386 waagent[1602]: 54 7811 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 10 00:45:39.021386 waagent[1602]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW May 10 00:45:39.022530 waagent[1602]: 2025-05-10T00:45:39.022460Z INFO ExtHandler ExtHandler Setting up persistent firewall rules May 10 00:45:39.025181 waagent[1602]: 2025-05-10T00:45:39.025077Z INFO ExtHandler ExtHandler The firewalld service is not present on the system May 10 00:45:39.025420 waagent[1602]: 2025-05-10T00:45:39.025367Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 10 00:45:39.025755 waagent[1602]: 2025-05-10T00:45:39.025700Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 10 00:45:39.034010 waagent[1602]: 2025-05-10T00:45:39.033953Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 10 00:45:39.034517 waagent[1602]: 2025-05-10T00:45:39.034455Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 10 00:45:39.041890 waagent[1602]: 2025-05-10T00:45:39.041817Z INFO ExtHandler ExtHandler WALinuxAgent-2.13.1.1 running as process 1602 May 10 00:45:39.044863 waagent[1602]: 2025-05-10T00:45:39.044793Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 10 00:45:39.045668 waagent[1602]: 2025-05-10T00:45:39.045605Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled May 10 00:45:39.046530 waagent[1602]: 2025-05-10T00:45:39.046472Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False May 10 00:45:39.049104 waagent[1602]: 2025-05-10T00:45:39.049041Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] May 10 00:45:39.050363 waagent[1602]: 2025-05-10T00:45:39.050303Z INFO ExtHandler ExtHandler Starting env monitor service. May 10 00:45:39.051186 waagent[1602]: 2025-05-10T00:45:39.051129Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 10 00:45:39.051336 waagent[1602]: 2025-05-10T00:45:39.051289Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 10 00:45:39.051842 waagent[1602]: 2025-05-10T00:45:39.051785Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 10 00:45:39.052161 waagent[1602]: 2025-05-10T00:45:39.052102Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 10 00:45:39.052161 waagent[1602]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 10 00:45:39.052161 waagent[1602]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 May 10 00:45:39.052161 waagent[1602]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 10 00:45:39.052161 waagent[1602]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 10 00:45:39.052161 waagent[1602]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 10 00:45:39.052161 waagent[1602]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 10 00:45:39.055361 waagent[1602]: 2025-05-10T00:45:39.055255Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 10 00:45:39.055476 waagent[1602]: 2025-05-10T00:45:39.055412Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 10 00:45:39.055960 waagent[1602]: 2025-05-10T00:45:39.055868Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 10 00:45:39.056465 waagent[1602]: 2025-05-10T00:45:39.056397Z INFO EnvHandler ExtHandler Configure routes May 10 00:45:39.056794 waagent[1602]: 2025-05-10T00:45:39.056721Z INFO EnvHandler ExtHandler Gateway:None May 10 00:45:39.057382 waagent[1602]: 2025-05-10T00:45:39.057315Z INFO EnvHandler ExtHandler Routes:None May 10 00:45:39.057892 waagent[1602]: 2025-05-10T00:45:39.057820Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 10 00:45:39.058111 waagent[1602]: 2025-05-10T00:45:39.058057Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 10 00:45:39.067063 waagent[1602]: 2025-05-10T00:45:39.066947Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 10 00:45:39.067354 waagent[1602]: 2025-05-10T00:45:39.067286Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 10 00:45:39.069350 waagent[1602]: 2025-05-10T00:45:39.069234Z INFO MonitorHandler ExtHandler Network interfaces: May 10 00:45:39.069350 waagent[1602]: Executing ['ip', '-a', '-o', 'link']: May 10 00:45:39.069350 waagent[1602]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 10 00:45:39.069350 waagent[1602]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:37:aa:bc brd ff:ff:ff:ff:ff:ff May 10 00:45:39.069350 waagent[1602]: 3: enP29259s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:37:aa:bc brd ff:ff:ff:ff:ff:ff\ altname enP29259p0s2 May 10 00:45:39.069350 waagent[1602]: Executing ['ip', '-4', '-a', '-o', 'address']: May 10 00:45:39.069350 waagent[1602]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 10 00:45:39.069350 waagent[1602]: 2: eth0 inet 10.200.8.32/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever May 10 00:45:39.069350 waagent[1602]: Executing ['ip', '-6', '-a', '-o', 'address']: May 10 00:45:39.069350 waagent[1602]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 10 00:45:39.069350 waagent[1602]: 2: eth0 inet6 fe80::7e1e:52ff:fe37:aabc/64 scope link \ valid_lft forever preferred_lft forever May 10 00:45:39.069993 waagent[1602]: 2025-05-10T00:45:39.069927Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 10 00:45:39.094070 waagent[1602]: 2025-05-10T00:45:39.093798Z INFO ExtHandler ExtHandler Downloading agent manifest May 10 00:45:39.097343 waagent[1602]: 2025-05-10T00:45:39.097280Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 10 00:45:39.132621 waagent[1602]: 2025-05-10T00:45:39.132475Z INFO ExtHandler ExtHandler May 10 00:45:39.133666 waagent[1602]: 2025-05-10T00:45:39.133585Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: f63b9122-d8a4-45d9-904d-323af06b8af0 correlation a52c4f97-8c3f-4455-9812-ddd4f079f984 created: 2025-05-10T00:44:18.212624Z] May 10 00:45:39.135865 waagent[1602]: 2025-05-10T00:45:39.135806Z WARNING EnvHandler ExtHandler The firewall is not configured correctly. The following rules are missing: ['ACCEPT DNS'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n']. Will reset it. Current state: May 10 00:45:39.135865 waagent[1602]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 10 00:45:39.135865 waagent[1602]: pkts bytes target prot opt in out source destination May 10 00:45:39.135865 waagent[1602]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 10 00:45:39.135865 waagent[1602]: pkts bytes target prot opt in out source destination May 10 00:45:39.135865 waagent[1602]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 10 00:45:39.135865 waagent[1602]: pkts bytes target prot opt in out source destination May 10 00:45:39.135865 waagent[1602]: 83 11319 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 10 00:45:39.135865 waagent[1602]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW May 10 00:45:39.139395 waagent[1602]: 2025-05-10T00:45:39.139339Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. May 10 00:45:39.147055 waagent[1602]: 2025-05-10T00:45:39.146933Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 14 ms] May 10 00:45:39.184572 waagent[1602]: 2025-05-10T00:45:39.184493Z INFO ExtHandler ExtHandler Looking for existing remote access users. May 10 00:45:39.187234 waagent[1602]: 2025-05-10T00:45:39.187163Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.13.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 98A06D9A-BCE1-4458-93E3-F2B483A5F50D;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] May 10 00:45:39.203107 waagent[1602]: 2025-05-10T00:45:39.202994Z INFO EnvHandler ExtHandler The firewall was setup successfully: May 10 00:45:39.203107 waagent[1602]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 10 00:45:39.203107 waagent[1602]: pkts bytes target prot opt in out source destination May 10 00:45:39.203107 waagent[1602]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 10 00:45:39.203107 waagent[1602]: pkts bytes target prot opt in out source destination May 10 00:45:39.203107 waagent[1602]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 10 00:45:39.203107 waagent[1602]: pkts bytes target prot opt in out source destination May 10 00:45:39.203107 waagent[1602]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 May 10 00:45:39.203107 waagent[1602]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 10 00:45:39.203107 waagent[1602]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW May 10 00:45:39.754872 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 10 00:45:39.755175 systemd[1]: Stopped kubelet.service. May 10 00:45:39.755231 systemd[1]: kubelet.service: Consumed 1.077s CPU time. May 10 00:45:39.757080 systemd[1]: Starting kubelet.service... May 10 00:45:39.848336 systemd[1]: Started kubelet.service. May 10 00:45:40.496395 kubelet[1654]: E0510 00:45:40.496344 1654 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:45:40.499516 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:45:40.499679 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:45:50.504799 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 10 00:45:50.505062 systemd[1]: Stopped kubelet.service. May 10 00:45:50.507006 systemd[1]: Starting kubelet.service... May 10 00:45:50.593304 systemd[1]: Started kubelet.service. May 10 00:45:51.190370 kubelet[1664]: E0510 00:45:51.190283 1664 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:45:51.192647 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:45:51.192809 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:46:01.255034 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 10 00:46:01.255342 systemd[1]: Stopped kubelet.service. May 10 00:46:01.257395 systemd[1]: Starting kubelet.service... May 10 00:46:01.350475 systemd[1]: Started kubelet.service. May 10 00:46:01.397765 kubelet[1674]: E0510 00:46:01.397724 1674 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:46:01.399427 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:46:01.399590 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:46:05.134770 systemd[1]: Created slice system-sshd.slice. May 10 00:46:05.136869 systemd[1]: Started sshd@0-10.200.8.32:22-10.200.16.10:52178.service. May 10 00:46:05.925381 sshd[1681]: Accepted publickey for core from 10.200.16.10 port 52178 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:46:05.927157 sshd[1681]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:05.931945 systemd-logind[1395]: New session 3 of user core. May 10 00:46:05.933149 systemd[1]: Started session-3.scope. May 10 00:46:06.566540 systemd[1]: Started sshd@1-10.200.8.32:22-10.200.16.10:52188.service. May 10 00:46:07.341502 sshd[1686]: Accepted publickey for core from 10.200.16.10 port 52188 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:46:07.343064 sshd[1686]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:07.351148 systemd[1]: Started session-4.scope. May 10 00:46:07.351699 systemd-logind[1395]: New session 4 of user core. May 10 00:46:07.889157 sshd[1686]: pam_unix(sshd:session): session closed for user core May 10 00:46:07.891996 systemd[1]: sshd@1-10.200.8.32:22-10.200.16.10:52188.service: Deactivated successfully. May 10 00:46:07.893032 systemd[1]: session-4.scope: Deactivated successfully. May 10 00:46:07.893787 systemd-logind[1395]: Session 4 logged out. Waiting for processes to exit. May 10 00:46:07.894706 systemd-logind[1395]: Removed session 4. May 10 00:46:08.004462 systemd[1]: Started sshd@2-10.200.8.32:22-10.200.16.10:52204.service. May 10 00:46:08.551911 kernel: hv_balloon: Max. dynamic memory size: 8192 MB May 10 00:46:08.701695 sshd[1692]: Accepted publickey for core from 10.200.16.10 port 52204 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:46:08.703388 sshd[1692]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:08.709442 systemd[1]: Started session-5.scope. May 10 00:46:08.710025 systemd-logind[1395]: New session 5 of user core. May 10 00:46:09.152168 sshd[1692]: pam_unix(sshd:session): session closed for user core May 10 00:46:09.155236 systemd[1]: sshd@2-10.200.8.32:22-10.200.16.10:52204.service: Deactivated successfully. May 10 00:46:09.156071 systemd[1]: session-5.scope: Deactivated successfully. May 10 00:46:09.156660 systemd-logind[1395]: Session 5 logged out. Waiting for processes to exit. May 10 00:46:09.157450 systemd-logind[1395]: Removed session 5. May 10 00:46:09.259407 systemd[1]: Started sshd@3-10.200.8.32:22-10.200.16.10:34424.service. May 10 00:46:09.898271 sshd[1698]: Accepted publickey for core from 10.200.16.10 port 34424 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:46:09.899652 sshd[1698]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:09.905724 systemd[1]: Started session-6.scope. May 10 00:46:09.906366 systemd-logind[1395]: New session 6 of user core. May 10 00:46:10.348850 sshd[1698]: pam_unix(sshd:session): session closed for user core May 10 00:46:10.352458 systemd[1]: sshd@3-10.200.8.32:22-10.200.16.10:34424.service: Deactivated successfully. May 10 00:46:10.353616 systemd[1]: session-6.scope: Deactivated successfully. May 10 00:46:10.354247 systemd-logind[1395]: Session 6 logged out. Waiting for processes to exit. May 10 00:46:10.355162 systemd-logind[1395]: Removed session 6. May 10 00:46:10.454663 systemd[1]: Started sshd@4-10.200.8.32:22-10.200.16.10:34434.service. May 10 00:46:11.135264 sshd[1704]: Accepted publickey for core from 10.200.16.10 port 34434 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:46:11.136709 sshd[1704]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:11.142140 systemd[1]: Started session-7.scope. May 10 00:46:11.142576 systemd-logind[1395]: New session 7 of user core. May 10 00:46:11.504961 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 10 00:46:11.505221 systemd[1]: Stopped kubelet.service. May 10 00:46:11.506953 systemd[1]: Starting kubelet.service... May 10 00:46:12.127945 systemd[1]: Started kubelet.service. May 10 00:46:12.174047 sudo[1707]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 10 00:46:12.174348 sudo[1707]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:46:12.184442 kubelet[1712]: E0510 00:46:12.184415 1712 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:46:12.185959 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:46:12.186116 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:46:12.194184 dbus-daemon[1384]: \xd0m\x9d\xe7\x80U: received setenforce notice (enforcing=-1699447520) May 10 00:46:12.195965 sudo[1707]: pam_unix(sudo:session): session closed for user root May 10 00:46:12.311005 sshd[1704]: pam_unix(sshd:session): session closed for user core May 10 00:46:12.314104 systemd[1]: sshd@4-10.200.8.32:22-10.200.16.10:34434.service: Deactivated successfully. May 10 00:46:12.315009 systemd[1]: session-7.scope: Deactivated successfully. May 10 00:46:12.315625 systemd-logind[1395]: Session 7 logged out. Waiting for processes to exit. May 10 00:46:12.316492 systemd-logind[1395]: Removed session 7. May 10 00:46:12.417010 systemd[1]: Started sshd@5-10.200.8.32:22-10.200.16.10:34438.service. May 10 00:46:13.059090 sshd[1722]: Accepted publickey for core from 10.200.16.10 port 34438 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:46:13.060586 sshd[1722]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:13.067787 systemd[1]: Started session-8.scope. May 10 00:46:13.069143 systemd-logind[1395]: New session 8 of user core. May 10 00:46:13.257648 update_engine[1396]: I0510 00:46:13.257587 1396 update_attempter.cc:509] Updating boot flags... May 10 00:46:13.414812 sudo[1770]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 10 00:46:13.415150 sudo[1770]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:46:13.420196 sudo[1770]: pam_unix(sudo:session): session closed for user root May 10 00:46:13.428620 sudo[1769]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 10 00:46:13.429419 sudo[1769]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:46:13.454836 systemd[1]: Stopping audit-rules.service... May 10 00:46:13.457000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:46:13.462799 auditctl[1790]: No rules May 10 00:46:13.464543 kernel: kauditd_printk_skb: 125 callbacks suppressed May 10 00:46:13.464582 kernel: audit: type=1305 audit(1746837973.457:207): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:46:13.473244 systemd[1]: audit-rules.service: Deactivated successfully. May 10 00:46:13.473454 systemd[1]: Stopped audit-rules.service. May 10 00:46:13.457000 audit[1790]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffffc77f40 a2=420 a3=0 items=0 ppid=1 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.511904 kernel: audit: type=1300 audit(1746837973.457:207): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffffc77f40 a2=420 a3=0 items=0 ppid=1 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.510417 systemd[1]: Starting audit-rules.service... May 10 00:46:13.457000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 10 00:46:13.525909 kernel: audit: type=1327 audit(1746837973.457:207): proctitle=2F7362696E2F617564697463746C002D44 May 10 00:46:13.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:13.539905 kernel: audit: type=1131 audit(1746837973.472:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:13.540646 augenrules[1812]: No rules May 10 00:46:13.541220 systemd[1]: Finished audit-rules.service. May 10 00:46:13.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:13.542411 sudo[1769]: pam_unix(sudo:session): session closed for user root May 10 00:46:13.552901 kernel: audit: type=1130 audit(1746837973.540:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:13.552965 kernel: audit: type=1106 audit(1746837973.541:210): pid=1769 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:46:13.541000 audit[1769]: USER_END pid=1769 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:46:13.541000 audit[1769]: CRED_DISP pid=1769 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:46:13.568913 kernel: audit: type=1104 audit(1746837973.541:211): pid=1769 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:46:13.653378 sshd[1722]: pam_unix(sshd:session): session closed for user core May 10 00:46:13.654000 audit[1722]: USER_END pid=1722 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:13.656862 systemd[1]: sshd@5-10.200.8.32:22-10.200.16.10:34438.service: Deactivated successfully. May 10 00:46:13.657743 systemd[1]: session-8.scope: Deactivated successfully. May 10 00:46:13.659385 systemd-logind[1395]: Session 8 logged out. Waiting for processes to exit. May 10 00:46:13.660659 systemd-logind[1395]: Removed session 8. May 10 00:46:13.654000 audit[1722]: CRED_DISP pid=1722 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:13.687994 kernel: audit: type=1106 audit(1746837973.654:212): pid=1722 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:13.688107 kernel: audit: type=1104 audit(1746837973.654:213): pid=1722 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:13.688144 kernel: audit: type=1131 audit(1746837973.654:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.32:22-10.200.16.10:34438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:13.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.32:22-10.200.16.10:34438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:13.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.32:22-10.200.16.10:34452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:13.759087 systemd[1]: Started sshd@6-10.200.8.32:22-10.200.16.10:34452.service. May 10 00:46:14.398000 audit[1818]: USER_ACCT pid=1818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:14.400118 sshd[1818]: Accepted publickey for core from 10.200.16.10 port 34452 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:46:14.400000 audit[1818]: CRED_ACQ pid=1818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:14.400000 audit[1818]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe97adb110 a2=3 a3=0 items=0 ppid=1 pid=1818 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:14.400000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:14.401591 sshd[1818]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:14.407115 systemd[1]: Started session-9.scope. May 10 00:46:14.407995 systemd-logind[1395]: New session 9 of user core. May 10 00:46:14.412000 audit[1818]: USER_START pid=1818 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:14.413000 audit[1820]: CRED_ACQ pid=1820 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:14.747000 audit[1821]: USER_ACCT pid=1821 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:46:14.747000 audit[1821]: CRED_REFR pid=1821 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:46:14.748219 sudo[1821]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 10 00:46:14.748517 sudo[1821]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:46:14.749000 audit[1821]: USER_START pid=1821 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:46:14.777633 systemd[1]: Starting coreos-metadata.service... May 10 00:46:14.848418 coreos-metadata[1825]: May 10 00:46:14.848 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 May 10 00:46:14.850959 coreos-metadata[1825]: May 10 00:46:14.850 INFO Fetch successful May 10 00:46:14.851246 coreos-metadata[1825]: May 10 00:46:14.851 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 May 10 00:46:14.852898 coreos-metadata[1825]: May 10 00:46:14.852 INFO Fetch successful May 10 00:46:14.853303 coreos-metadata[1825]: May 10 00:46:14.853 INFO Fetching http://168.63.129.16/machine/6827377d-bdef-4e25-a1fb-0e539df77187/589ad0d5%2D3bef%2D438e%2Db5d1%2D052481935e0d.%5Fci%2D3510.3.7%2Dn%2Da3a45e53be?comp=config&type=sharedConfig&incarnation=1: Attempt #1 May 10 00:46:14.854971 coreos-metadata[1825]: May 10 00:46:14.854 INFO Fetch successful May 10 00:46:14.888228 coreos-metadata[1825]: May 10 00:46:14.888 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 May 10 00:46:14.898098 coreos-metadata[1825]: May 10 00:46:14.898 INFO Fetch successful May 10 00:46:14.909034 systemd[1]: Finished coreos-metadata.service. May 10 00:46:14.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:18.182758 systemd[1]: Stopped kubelet.service. May 10 00:46:18.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:18.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:18.190215 systemd[1]: Starting kubelet.service... May 10 00:46:18.216960 systemd[1]: Reloading. May 10 00:46:18.310484 /usr/lib/systemd/system-generators/torcx-generator[1883]: time="2025-05-10T00:46:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:46:18.319016 /usr/lib/systemd/system-generators/torcx-generator[1883]: time="2025-05-10T00:46:18Z" level=info msg="torcx already run" May 10 00:46:18.430806 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:46:18.430827 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:46:18.447011 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:46:18.542137 kernel: kauditd_printk_skb: 14 callbacks suppressed May 10 00:46:18.542312 kernel: audit: type=1400 audit(1746837978.528:227): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.553006 kernel: audit: type=1400 audit(1746837978.528:228): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.564336 kernel: audit: type=1400 audit(1746837978.528:229): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.578404 kernel: audit: type=1400 audit(1746837978.528:230): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.593530 kernel: audit: type=1400 audit(1746837978.528:231): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.625841 kernel: audit: type=1400 audit(1746837978.528:232): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.625989 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:46:18.626012 kernel: audit: type=1400 audit(1746837978.528:233): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.626035 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 10 00:46:18.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.647347 kernel: audit: type=1400 audit(1746837978.528:234): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit: BPF prog-id=44 op=LOAD May 10 00:46:18.542000 audit: BPF prog-id=27 op=UNLOAD May 10 00:46:18.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit: BPF prog-id=45 op=LOAD May 10 00:46:18.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit: BPF prog-id=46 op=LOAD May 10 00:46:18.542000 audit: BPF prog-id=28 op=UNLOAD May 10 00:46:18.542000 audit: BPF prog-id=29 op=UNLOAD May 10 00:46:18.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.552000 audit: BPF prog-id=47 op=LOAD May 10 00:46:18.552000 audit: BPF prog-id=36 op=UNLOAD May 10 00:46:18.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.564000 audit: BPF prog-id=48 op=LOAD May 10 00:46:18.564000 audit: BPF prog-id=37 op=UNLOAD May 10 00:46:18.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.592000 audit: BPF prog-id=49 op=LOAD May 10 00:46:18.592000 audit: BPF prog-id=41 op=UNLOAD May 10 00:46:18.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.648000 audit: BPF prog-id=51 op=LOAD May 10 00:46:18.648000 audit: BPF prog-id=38 op=UNLOAD May 10 00:46:18.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit: BPF prog-id=52 op=LOAD May 10 00:46:18.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit: BPF prog-id=53 op=LOAD May 10 00:46:18.649000 audit: BPF prog-id=39 op=UNLOAD May 10 00:46:18.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit: BPF prog-id=54 op=LOAD May 10 00:46:18.649000 audit: BPF prog-id=31 op=UNLOAD May 10 00:46:18.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.650000 audit: BPF prog-id=32 op=UNLOAD May 10 00:46:18.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.651000 audit: BPF prog-id=57 op=LOAD May 10 00:46:18.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:18.651000 audit: BPF prog-id=58 op=LOAD May 10 00:46:18.651000 audit: BPF prog-id=34 op=UNLOAD May 10 00:46:18.651000 audit: BPF prog-id=35 op=UNLOAD May 10 00:46:18.671343 systemd[1]: Started kubelet.service. May 10 00:46:18.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:18.674199 systemd[1]: Stopping kubelet.service... May 10 00:46:18.674748 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:46:18.674960 systemd[1]: Stopped kubelet.service. May 10 00:46:18.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:18.676792 systemd[1]: Starting kubelet.service... May 10 00:46:18.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:18.829080 systemd[1]: Started kubelet.service. May 10 00:46:18.869994 kubelet[1954]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:46:18.869994 kubelet[1954]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 00:46:18.869994 kubelet[1954]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:46:18.870491 kubelet[1954]: I0510 00:46:18.870050 1954 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:46:19.082903 kubelet[1954]: I0510 00:46:19.082774 1954 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 10 00:46:19.082903 kubelet[1954]: I0510 00:46:19.082799 1954 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:46:19.083362 kubelet[1954]: I0510 00:46:19.083330 1954 server.go:927] "Client rotation is on, will bootstrap in background" May 10 00:46:19.486660 kubelet[1954]: I0510 00:46:19.485840 1954 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:46:19.502083 kubelet[1954]: I0510 00:46:19.502051 1954 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:46:19.507233 kubelet[1954]: I0510 00:46:19.507178 1954 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:46:19.507445 kubelet[1954]: I0510 00:46:19.507230 1954 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.200.8.32","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 10 00:46:19.508106 kubelet[1954]: I0510 00:46:19.508085 1954 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:46:19.508195 kubelet[1954]: I0510 00:46:19.508112 1954 container_manager_linux.go:301] "Creating device plugin manager" May 10 00:46:19.508269 kubelet[1954]: I0510 00:46:19.508253 1954 state_mem.go:36] "Initialized new in-memory state store" May 10 00:46:19.509182 kubelet[1954]: I0510 00:46:19.509163 1954 kubelet.go:400] "Attempting to sync node with API server" May 10 00:46:19.509182 kubelet[1954]: I0510 00:46:19.509185 1954 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:46:19.509314 kubelet[1954]: I0510 00:46:19.509210 1954 kubelet.go:312] "Adding apiserver pod source" May 10 00:46:19.509314 kubelet[1954]: I0510 00:46:19.509231 1954 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:46:19.509702 kubelet[1954]: E0510 00:46:19.509658 1954 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:19.516921 kubelet[1954]: E0510 00:46:19.516011 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:19.520161 kubelet[1954]: I0510 00:46:19.520132 1954 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:46:19.525232 kubelet[1954]: I0510 00:46:19.525208 1954 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:46:19.525409 kubelet[1954]: W0510 00:46:19.525350 1954 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 10 00:46:19.526148 kubelet[1954]: I0510 00:46:19.526027 1954 server.go:1264] "Started kubelet" May 10 00:46:19.529439 kubelet[1954]: I0510 00:46:19.529409 1954 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:46:19.530657 kubelet[1954]: I0510 00:46:19.530638 1954 server.go:455] "Adding debug handlers to kubelet server" May 10 00:46:19.536339 kubelet[1954]: I0510 00:46:19.536279 1954 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:46:19.536587 kubelet[1954]: I0510 00:46:19.536566 1954 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:46:19.536000 audit[1954]: AVC avc: denied { mac_admin } for pid=1954 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:19.536000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:46:19.536000 audit[1954]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009aa000 a1=c0007a4d20 a2=c0007dbfb0 a3=25 items=0 ppid=1 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:19.536000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:46:19.536000 audit[1954]: AVC avc: denied { mac_admin } for pid=1954 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:19.536000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:46:19.536000 audit[1954]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007e1080 a1=c0007a4d38 a2=c0009aa090 a3=25 items=0 ppid=1 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:19.536000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:46:19.538285 kubelet[1954]: I0510 00:46:19.537720 1954 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:46:19.538285 kubelet[1954]: I0510 00:46:19.537766 1954 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 00:46:19.538285 kubelet[1954]: I0510 00:46:19.537846 1954 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:46:19.542952 kubelet[1954]: E0510 00:46:19.542685 1954 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.200.8.32\" not found" May 10 00:46:19.542952 kubelet[1954]: I0510 00:46:19.542736 1954 volume_manager.go:291] "Starting Kubelet Volume Manager" May 10 00:46:19.542952 kubelet[1954]: I0510 00:46:19.542842 1954 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 00:46:19.542952 kubelet[1954]: I0510 00:46:19.542936 1954 reconciler.go:26] "Reconciler: start to sync state" May 10 00:46:19.543258 kubelet[1954]: E0510 00:46:19.543233 1954 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:46:19.544118 kubelet[1954]: I0510 00:46:19.544099 1954 factory.go:221] Registration of the systemd container factory successfully May 10 00:46:19.544219 kubelet[1954]: I0510 00:46:19.544198 1954 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:46:19.545394 kubelet[1954]: I0510 00:46:19.545375 1954 factory.go:221] Registration of the containerd container factory successfully May 10 00:46:19.546507 kubelet[1954]: E0510 00:46:19.546474 1954 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.8.32\" not found" node="10.200.8.32" May 10 00:46:19.545000 audit[1964]: NETFILTER_CFG table=mangle:9 family=2 entries=2 op=nft_register_chain pid=1964 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:19.545000 audit[1964]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcdbfebe90 a2=0 a3=7ffcdbfebe7c items=0 ppid=1954 pid=1964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:19.545000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:46:19.551000 audit[1967]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1967 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:19.551000 audit[1967]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd1f7e9710 a2=0 a3=7ffd1f7e96fc items=0 ppid=1954 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:19.551000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:46:19.558622 kubelet[1954]: I0510 00:46:19.558594 1954 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 00:46:19.558622 kubelet[1954]: I0510 00:46:19.558611 1954 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 00:46:19.558735 kubelet[1954]: I0510 00:46:19.558629 1954 state_mem.go:36] "Initialized new in-memory state store" May 10 00:46:19.558000 audit[1970]: NETFILTER_CFG table=filter:11 family=2 entries=2 op=nft_register_chain pid=1970 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:19.558000 audit[1970]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffef29fbf80 a2=0 a3=7ffef29fbf6c items=0 ppid=1954 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:19.558000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:46:19.560000 audit[1972]: NETFILTER_CFG table=filter:12 family=2 entries=2 op=nft_register_chain pid=1972 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:19.560000 audit[1972]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffe81d5e40 a2=0 a3=7fffe81d5e2c items=0 ppid=1954 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:19.560000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:46:19.565401 kubelet[1954]: I0510 00:46:19.565387 1954 policy_none.go:49] "None policy: Start" May 10 00:46:19.566003 kubelet[1954]: I0510 00:46:19.565990 1954 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 00:46:19.566100 kubelet[1954]: I0510 00:46:19.566092 1954 state_mem.go:35] "Initializing new in-memory state store" May 10 00:46:19.574008 systemd[1]: Created slice kubepods.slice. May 10 00:46:19.580046 systemd[1]: Created slice kubepods-burstable.slice. May 10 00:46:19.587671 systemd[1]: Created slice kubepods-besteffort.slice. May 10 00:46:19.600000 audit[1954]: AVC avc: denied { mac_admin } for pid=1954 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:19.600000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:46:19.600000 audit[1954]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d5e210 a1=c000d56408 a2=c000d5e1e0 a3=25 items=0 ppid=1 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:19.600000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:46:19.602268 kubelet[1954]: I0510 00:46:19.601201 1954 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:46:19.602268 kubelet[1954]: I0510 00:46:19.601303 1954 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:46:19.603035 kubelet[1954]: I0510 00:46:19.602767 1954 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:46:19.604823 kubelet[1954]: I0510 00:46:19.604793 1954 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:46:19.602000 audit[1977]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1977 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:19.602000 audit[1977]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe616f8030 a2=0 a3=7ffe616f801c items=0 ppid=1954 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:19.602000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 10 00:46:19.606066 kubelet[1954]: E0510 00:46:19.606038 1954 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.8.32\" not found" May 10 00:46:19.606608 kubelet[1954]: I0510 00:46:19.606579 1954 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:46:19.607000 audit[1978]: NETFILTER_CFG table=mangle:14 family=10 entries=2 op=nft_register_chain pid=1978 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:19.607000 audit[1978]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffead3b1c00 a2=0 a3=7ffead3b1bec items=0 ppid=1954 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:19.607000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:46:19.609013 kubelet[1954]: I0510 00:46:19.608989 1954 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:46:19.609013 kubelet[1954]: I0510 00:46:19.609011 1954 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 00:46:19.609121 kubelet[1954]: I0510 00:46:19.609033 1954 kubelet.go:2337] "Starting kubelet main sync loop" May 10 00:46:19.609121 kubelet[1954]: E0510 00:46:19.609076 1954 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 10 00:46:19.609000 audit[1979]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1979 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:19.609000 audit[1979]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff507b5a0 a2=0 a3=7ffff507b58c items=0 ppid=1954 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:19.609000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:46:19.610000 audit[1980]: NETFILTER_CFG table=mangle:16 family=10 entries=1 op=nft_register_chain pid=1980 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:19.610000 audit[1980]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd628b0800 a2=0 a3=7ffd628b07ec items=0 ppid=1954 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:19.610000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:46:19.611000 audit[1981]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1981 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:19.611000 audit[1981]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd888e0b90 a2=0 a3=7ffd888e0b7c items=0 ppid=1954 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:19.611000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:46:19.612000 audit[1982]: NETFILTER_CFG table=nat:18 family=10 entries=2 op=nft_register_chain pid=1982 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:19.612000 audit[1982]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc8b38f500 a2=0 a3=7ffc8b38f4ec items=0 ppid=1954 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:19.612000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:46:19.613000 audit[1983]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1983 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:19.613000 audit[1983]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff6f326ab0 a2=0 a3=7fff6f326a9c items=0 ppid=1954 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:19.613000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:46:19.619000 audit[1984]: NETFILTER_CFG table=filter:20 family=10 entries=2 op=nft_register_chain pid=1984 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:19.619000 audit[1984]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe3e5163a0 a2=0 a3=7ffe3e51638c items=0 ppid=1954 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:19.619000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:46:19.644267 kubelet[1954]: I0510 00:46:19.644241 1954 kubelet_node_status.go:73] "Attempting to register node" node="10.200.8.32" May 10 00:46:19.659065 kubelet[1954]: I0510 00:46:19.659005 1954 kubelet_node_status.go:76] "Successfully registered node" node="10.200.8.32" May 10 00:46:19.778587 kubelet[1954]: I0510 00:46:19.778553 1954 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 10 00:46:19.779064 env[1406]: time="2025-05-10T00:46:19.779020649Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 10 00:46:19.779504 kubelet[1954]: I0510 00:46:19.779278 1954 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 10 00:46:19.854953 sudo[1821]: pam_unix(sudo:session): session closed for user root May 10 00:46:19.854000 audit[1821]: USER_END pid=1821 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:46:19.854000 audit[1821]: CRED_DISP pid=1821 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:46:19.957460 sshd[1818]: pam_unix(sshd:session): session closed for user core May 10 00:46:19.958000 audit[1818]: USER_END pid=1818 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:19.958000 audit[1818]: CRED_DISP pid=1818 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:46:19.960755 systemd[1]: sshd@6-10.200.8.32:22-10.200.16.10:34452.service: Deactivated successfully. May 10 00:46:19.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.32:22-10.200.16.10:34452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:19.961868 systemd[1]: session-9.scope: Deactivated successfully. May 10 00:46:19.964211 systemd-logind[1395]: Session 9 logged out. Waiting for processes to exit. May 10 00:46:19.965137 systemd-logind[1395]: Removed session 9. May 10 00:46:20.084908 kubelet[1954]: I0510 00:46:20.084745 1954 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 10 00:46:20.085840 kubelet[1954]: W0510 00:46:20.085815 1954 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 10 00:46:20.085996 kubelet[1954]: W0510 00:46:20.085815 1954 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 10 00:46:20.085996 kubelet[1954]: W0510 00:46:20.085895 1954 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 10 00:46:20.517085 kubelet[1954]: I0510 00:46:20.517051 1954 apiserver.go:52] "Watching apiserver" May 10 00:46:20.517300 kubelet[1954]: E0510 00:46:20.517044 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:20.520530 kubelet[1954]: I0510 00:46:20.520491 1954 topology_manager.go:215] "Topology Admit Handler" podUID="5ddac81e-2040-4f8f-aa4c-f057360c8922" podNamespace="calico-system" podName="calico-node-vmngv" May 10 00:46:20.520654 kubelet[1954]: I0510 00:46:20.520620 1954 topology_manager.go:215] "Topology Admit Handler" podUID="89799d19-090a-4418-ac5e-412518f2dcdb" podNamespace="calico-system" podName="csi-node-driver-lxt8k" May 10 00:46:20.520741 kubelet[1954]: I0510 00:46:20.520722 1954 topology_manager.go:215] "Topology Admit Handler" podUID="0facfc6d-ce9d-4418-94a1-358ea4655f14" podNamespace="kube-system" podName="kube-proxy-fk9rw" May 10 00:46:20.521042 kubelet[1954]: E0510 00:46:20.521011 1954 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lxt8k" podUID="89799d19-090a-4418-ac5e-412518f2dcdb" May 10 00:46:20.527182 systemd[1]: Created slice kubepods-besteffort-pod0facfc6d_ce9d_4418_94a1_358ea4655f14.slice. May 10 00:46:20.538609 systemd[1]: Created slice kubepods-besteffort-pod5ddac81e_2040_4f8f_aa4c_f057360c8922.slice. May 10 00:46:20.543936 kubelet[1954]: I0510 00:46:20.543912 1954 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 00:46:20.550519 kubelet[1954]: I0510 00:46:20.550493 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0facfc6d-ce9d-4418-94a1-358ea4655f14-xtables-lock\") pod \"kube-proxy-fk9rw\" (UID: \"0facfc6d-ce9d-4418-94a1-358ea4655f14\") " pod="kube-system/kube-proxy-fk9rw" May 10 00:46:20.550618 kubelet[1954]: I0510 00:46:20.550528 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f6t7l\" (UniqueName: \"kubernetes.io/projected/0facfc6d-ce9d-4418-94a1-358ea4655f14-kube-api-access-f6t7l\") pod \"kube-proxy-fk9rw\" (UID: \"0facfc6d-ce9d-4418-94a1-358ea4655f14\") " pod="kube-system/kube-proxy-fk9rw" May 10 00:46:20.550618 kubelet[1954]: I0510 00:46:20.550558 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dq65g\" (UniqueName: \"kubernetes.io/projected/89799d19-090a-4418-ac5e-412518f2dcdb-kube-api-access-dq65g\") pod \"csi-node-driver-lxt8k\" (UID: \"89799d19-090a-4418-ac5e-412518f2dcdb\") " pod="calico-system/csi-node-driver-lxt8k" May 10 00:46:20.550618 kubelet[1954]: I0510 00:46:20.550579 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/0facfc6d-ce9d-4418-94a1-358ea4655f14-kube-proxy\") pod \"kube-proxy-fk9rw\" (UID: \"0facfc6d-ce9d-4418-94a1-358ea4655f14\") " pod="kube-system/kube-proxy-fk9rw" May 10 00:46:20.550618 kubelet[1954]: I0510 00:46:20.550601 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0facfc6d-ce9d-4418-94a1-358ea4655f14-lib-modules\") pod \"kube-proxy-fk9rw\" (UID: \"0facfc6d-ce9d-4418-94a1-358ea4655f14\") " pod="kube-system/kube-proxy-fk9rw" May 10 00:46:20.550789 kubelet[1954]: I0510 00:46:20.550621 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5ddac81e-2040-4f8f-aa4c-f057360c8922-lib-modules\") pod \"calico-node-vmngv\" (UID: \"5ddac81e-2040-4f8f-aa4c-f057360c8922\") " pod="calico-system/calico-node-vmngv" May 10 00:46:20.550789 kubelet[1954]: I0510 00:46:20.550643 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/5ddac81e-2040-4f8f-aa4c-f057360c8922-node-certs\") pod \"calico-node-vmngv\" (UID: \"5ddac81e-2040-4f8f-aa4c-f057360c8922\") " pod="calico-system/calico-node-vmngv" May 10 00:46:20.550789 kubelet[1954]: I0510 00:46:20.550664 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5ddac81e-2040-4f8f-aa4c-f057360c8922-var-lib-calico\") pod \"calico-node-vmngv\" (UID: \"5ddac81e-2040-4f8f-aa4c-f057360c8922\") " pod="calico-system/calico-node-vmngv" May 10 00:46:20.550789 kubelet[1954]: I0510 00:46:20.550688 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/89799d19-090a-4418-ac5e-412518f2dcdb-kubelet-dir\") pod \"csi-node-driver-lxt8k\" (UID: \"89799d19-090a-4418-ac5e-412518f2dcdb\") " pod="calico-system/csi-node-driver-lxt8k" May 10 00:46:20.550789 kubelet[1954]: I0510 00:46:20.550728 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/89799d19-090a-4418-ac5e-412518f2dcdb-registration-dir\") pod \"csi-node-driver-lxt8k\" (UID: \"89799d19-090a-4418-ac5e-412518f2dcdb\") " pod="calico-system/csi-node-driver-lxt8k" May 10 00:46:20.551016 kubelet[1954]: I0510 00:46:20.550750 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/89799d19-090a-4418-ac5e-412518f2dcdb-socket-dir\") pod \"csi-node-driver-lxt8k\" (UID: \"89799d19-090a-4418-ac5e-412518f2dcdb\") " pod="calico-system/csi-node-driver-lxt8k" May 10 00:46:20.551016 kubelet[1954]: I0510 00:46:20.550771 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5ddac81e-2040-4f8f-aa4c-f057360c8922-tigera-ca-bundle\") pod \"calico-node-vmngv\" (UID: \"5ddac81e-2040-4f8f-aa4c-f057360c8922\") " pod="calico-system/calico-node-vmngv" May 10 00:46:20.551016 kubelet[1954]: I0510 00:46:20.550802 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/5ddac81e-2040-4f8f-aa4c-f057360c8922-var-run-calico\") pod \"calico-node-vmngv\" (UID: \"5ddac81e-2040-4f8f-aa4c-f057360c8922\") " pod="calico-system/calico-node-vmngv" May 10 00:46:20.551016 kubelet[1954]: I0510 00:46:20.550824 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/5ddac81e-2040-4f8f-aa4c-f057360c8922-cni-bin-dir\") pod \"calico-node-vmngv\" (UID: \"5ddac81e-2040-4f8f-aa4c-f057360c8922\") " pod="calico-system/calico-node-vmngv" May 10 00:46:20.551016 kubelet[1954]: I0510 00:46:20.550850 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/5ddac81e-2040-4f8f-aa4c-f057360c8922-cni-net-dir\") pod \"calico-node-vmngv\" (UID: \"5ddac81e-2040-4f8f-aa4c-f057360c8922\") " pod="calico-system/calico-node-vmngv" May 10 00:46:20.551221 kubelet[1954]: I0510 00:46:20.550872 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/5ddac81e-2040-4f8f-aa4c-f057360c8922-cni-log-dir\") pod \"calico-node-vmngv\" (UID: \"5ddac81e-2040-4f8f-aa4c-f057360c8922\") " pod="calico-system/calico-node-vmngv" May 10 00:46:20.551221 kubelet[1954]: I0510 00:46:20.550909 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tdhdm\" (UniqueName: \"kubernetes.io/projected/5ddac81e-2040-4f8f-aa4c-f057360c8922-kube-api-access-tdhdm\") pod \"calico-node-vmngv\" (UID: \"5ddac81e-2040-4f8f-aa4c-f057360c8922\") " pod="calico-system/calico-node-vmngv" May 10 00:46:20.551221 kubelet[1954]: I0510 00:46:20.550935 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/89799d19-090a-4418-ac5e-412518f2dcdb-varrun\") pod \"csi-node-driver-lxt8k\" (UID: \"89799d19-090a-4418-ac5e-412518f2dcdb\") " pod="calico-system/csi-node-driver-lxt8k" May 10 00:46:20.551221 kubelet[1954]: I0510 00:46:20.550956 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5ddac81e-2040-4f8f-aa4c-f057360c8922-xtables-lock\") pod \"calico-node-vmngv\" (UID: \"5ddac81e-2040-4f8f-aa4c-f057360c8922\") " pod="calico-system/calico-node-vmngv" May 10 00:46:20.551221 kubelet[1954]: I0510 00:46:20.550985 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/5ddac81e-2040-4f8f-aa4c-f057360c8922-policysync\") pod \"calico-node-vmngv\" (UID: \"5ddac81e-2040-4f8f-aa4c-f057360c8922\") " pod="calico-system/calico-node-vmngv" May 10 00:46:20.551335 kubelet[1954]: I0510 00:46:20.551012 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/5ddac81e-2040-4f8f-aa4c-f057360c8922-flexvol-driver-host\") pod \"calico-node-vmngv\" (UID: \"5ddac81e-2040-4f8f-aa4c-f057360c8922\") " pod="calico-system/calico-node-vmngv" May 10 00:46:20.654625 kubelet[1954]: E0510 00:46:20.654588 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:20.654822 kubelet[1954]: W0510 00:46:20.654806 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:20.654986 kubelet[1954]: E0510 00:46:20.654966 1954 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:20.655316 kubelet[1954]: E0510 00:46:20.655288 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:20.655423 kubelet[1954]: W0510 00:46:20.655409 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:20.655516 kubelet[1954]: E0510 00:46:20.655504 1954 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:20.655800 kubelet[1954]: E0510 00:46:20.655789 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:20.655918 kubelet[1954]: W0510 00:46:20.655905 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:20.656024 kubelet[1954]: E0510 00:46:20.656012 1954 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:20.656303 kubelet[1954]: E0510 00:46:20.656290 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:20.656404 kubelet[1954]: W0510 00:46:20.656391 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:20.656499 kubelet[1954]: E0510 00:46:20.656484 1954 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:20.656793 kubelet[1954]: E0510 00:46:20.656773 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:20.658134 kubelet[1954]: W0510 00:46:20.658113 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:20.658250 kubelet[1954]: E0510 00:46:20.658236 1954 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:20.658661 kubelet[1954]: E0510 00:46:20.658646 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:20.658754 kubelet[1954]: W0510 00:46:20.658742 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:20.658835 kubelet[1954]: E0510 00:46:20.658823 1954 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:20.662489 kubelet[1954]: E0510 00:46:20.662472 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:20.662600 kubelet[1954]: W0510 00:46:20.662587 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:20.662674 kubelet[1954]: E0510 00:46:20.662663 1954 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:20.666491 kubelet[1954]: E0510 00:46:20.666469 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:20.666650 kubelet[1954]: W0510 00:46:20.666634 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:20.666735 kubelet[1954]: E0510 00:46:20.666722 1954 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:20.670327 kubelet[1954]: E0510 00:46:20.670313 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:20.670444 kubelet[1954]: W0510 00:46:20.670431 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:20.670536 kubelet[1954]: E0510 00:46:20.670524 1954 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:20.670900 kubelet[1954]: E0510 00:46:20.670873 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:20.670997 kubelet[1954]: W0510 00:46:20.670985 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:20.671076 kubelet[1954]: E0510 00:46:20.671065 1954 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:20.671377 kubelet[1954]: E0510 00:46:20.671365 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:20.671485 kubelet[1954]: W0510 00:46:20.671470 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:20.671574 kubelet[1954]: E0510 00:46:20.671561 1954 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:20.671843 kubelet[1954]: E0510 00:46:20.671832 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:20.671951 kubelet[1954]: W0510 00:46:20.671938 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:20.672033 kubelet[1954]: E0510 00:46:20.672022 1954 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:20.672272 kubelet[1954]: E0510 00:46:20.672262 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:20.672353 kubelet[1954]: W0510 00:46:20.672343 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:20.672466 kubelet[1954]: E0510 00:46:20.672455 1954 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:20.672723 kubelet[1954]: E0510 00:46:20.672710 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:20.672815 kubelet[1954]: W0510 00:46:20.672804 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:20.672907 kubelet[1954]: E0510 00:46:20.672895 1954 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:20.673209 kubelet[1954]: E0510 00:46:20.673198 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:20.673290 kubelet[1954]: W0510 00:46:20.673280 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:20.673362 kubelet[1954]: E0510 00:46:20.673352 1954 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:20.673623 kubelet[1954]: E0510 00:46:20.673612 1954 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:46:20.673697 kubelet[1954]: W0510 00:46:20.673687 1954 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:46:20.673763 kubelet[1954]: E0510 00:46:20.673752 1954 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:46:20.838207 env[1406]: time="2025-05-10T00:46:20.838076988Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fk9rw,Uid:0facfc6d-ce9d-4418-94a1-358ea4655f14,Namespace:kube-system,Attempt:0,}" May 10 00:46:20.843212 env[1406]: time="2025-05-10T00:46:20.843175098Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vmngv,Uid:5ddac81e-2040-4f8f-aa4c-f057360c8922,Namespace:calico-system,Attempt:0,}" May 10 00:46:21.518088 kubelet[1954]: E0510 00:46:21.518055 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:21.610759 kubelet[1954]: E0510 00:46:21.610382 1954 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lxt8k" podUID="89799d19-090a-4418-ac5e-412518f2dcdb" May 10 00:46:21.753675 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount756507559.mount: Deactivated successfully. May 10 00:46:21.778796 env[1406]: time="2025-05-10T00:46:21.778640565Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:21.781610 env[1406]: time="2025-05-10T00:46:21.781575671Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:21.793101 env[1406]: time="2025-05-10T00:46:21.793066092Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:21.800360 env[1406]: time="2025-05-10T00:46:21.800320006Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:21.802780 env[1406]: time="2025-05-10T00:46:21.802745510Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:21.806170 env[1406]: time="2025-05-10T00:46:21.806136516Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:21.808438 env[1406]: time="2025-05-10T00:46:21.808406321Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:21.812403 env[1406]: time="2025-05-10T00:46:21.812370528Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:21.873056 env[1406]: time="2025-05-10T00:46:21.872852841Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:46:21.873479 env[1406]: time="2025-05-10T00:46:21.873102841Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:46:21.873479 env[1406]: time="2025-05-10T00:46:21.873151242Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:46:21.873479 env[1406]: time="2025-05-10T00:46:21.873325242Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8cc73758f17205bd5c1205f6ed586462472b04d1dc0ad0de69eced2583a43247 pid=2021 runtime=io.containerd.runc.v2 May 10 00:46:21.883529 env[1406]: time="2025-05-10T00:46:21.883325361Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:46:21.883981 env[1406]: time="2025-05-10T00:46:21.883806461Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:46:21.884161 env[1406]: time="2025-05-10T00:46:21.884124562Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:46:21.886622 env[1406]: time="2025-05-10T00:46:21.884919564Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dc85137359e2250f7b98692fa5edc70bf6ae6af21dc343d917f80e31ab25728f pid=2023 runtime=io.containerd.runc.v2 May 10 00:46:21.898957 systemd[1]: Started cri-containerd-8cc73758f17205bd5c1205f6ed586462472b04d1dc0ad0de69eced2583a43247.scope. May 10 00:46:21.911816 systemd[1]: Started cri-containerd-dc85137359e2250f7b98692fa5edc70bf6ae6af21dc343d917f80e31ab25728f.scope. May 10 00:46:21.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.924000 audit: BPF prog-id=59 op=LOAD May 10 00:46:21.925000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.925000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2021 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863633733373538663137323035626435633132303566366564353836 May 10 00:46:21.926000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.926000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2021 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863633733373538663137323035626435633132303566366564353836 May 10 00:46:21.926000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.926000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.926000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.926000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.926000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.926000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.926000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.926000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.926000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.926000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.926000 audit: BPF prog-id=60 op=LOAD May 10 00:46:21.926000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000167990 items=0 ppid=2021 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863633733373538663137323035626435633132303566366564353836 May 10 00:46:21.927000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.927000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.927000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.927000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.927000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.927000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.927000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.927000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.927000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.927000 audit: BPF prog-id=61 op=LOAD May 10 00:46:21.927000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001679d8 items=0 ppid=2021 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863633733373538663137323035626435633132303566366564353836 May 10 00:46:21.928000 audit: BPF prog-id=61 op=UNLOAD May 10 00:46:21.928000 audit: BPF prog-id=60 op=UNLOAD May 10 00:46:21.928000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.928000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.928000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.928000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.928000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.928000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.928000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.928000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.928000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.928000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.928000 audit: BPF prog-id=62 op=LOAD May 10 00:46:21.928000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000167de8 items=0 ppid=2021 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863633733373538663137323035626435633132303566366564353836 May 10 00:46:21.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.931000 audit: BPF prog-id=63 op=LOAD May 10 00:46:21.932000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2023 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383531333733353965323235306637623938363932666135656463 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2023 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383531333733353965323235306637623938363932666135656463 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit: BPF prog-id=64 op=LOAD May 10 00:46:21.932000 audit[2045]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000234380 items=0 ppid=2023 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383531333733353965323235306637623938363932666135656463 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit: BPF prog-id=65 op=LOAD May 10 00:46:21.932000 audit[2045]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002343c8 items=0 ppid=2023 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383531333733353965323235306637623938363932666135656463 May 10 00:46:21.932000 audit: BPF prog-id=65 op=UNLOAD May 10 00:46:21.932000 audit: BPF prog-id=64 op=UNLOAD May 10 00:46:21.932000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { perfmon } for pid=2045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit[2045]: AVC avc: denied { bpf } for pid=2045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:21.932000 audit: BPF prog-id=66 op=LOAD May 10 00:46:21.932000 audit[2045]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002347d8 items=0 ppid=2023 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383531333733353965323235306637623938363932666135656463 May 10 00:46:21.950322 env[1406]: time="2025-05-10T00:46:21.950275086Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vmngv,Uid:5ddac81e-2040-4f8f-aa4c-f057360c8922,Namespace:calico-system,Attempt:0,} returns sandbox id \"8cc73758f17205bd5c1205f6ed586462472b04d1dc0ad0de69eced2583a43247\"" May 10 00:46:21.952364 env[1406]: time="2025-05-10T00:46:21.952329289Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fk9rw,Uid:0facfc6d-ce9d-4418-94a1-358ea4655f14,Namespace:kube-system,Attempt:0,} returns sandbox id \"dc85137359e2250f7b98692fa5edc70bf6ae6af21dc343d917f80e31ab25728f\"" May 10 00:46:21.953175 env[1406]: time="2025-05-10T00:46:21.953137791Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 10 00:46:22.519074 kubelet[1954]: E0510 00:46:22.519009 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:23.190129 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3999783389.mount: Deactivated successfully. May 10 00:46:23.364323 env[1406]: time="2025-05-10T00:46:23.364253328Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:23.374152 env[1406]: time="2025-05-10T00:46:23.373850743Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:23.377965 env[1406]: time="2025-05-10T00:46:23.377930650Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:23.380950 env[1406]: time="2025-05-10T00:46:23.380919955Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:23.381417 env[1406]: time="2025-05-10T00:46:23.381384456Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 10 00:46:23.383107 env[1406]: time="2025-05-10T00:46:23.383073758Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 10 00:46:23.384030 env[1406]: time="2025-05-10T00:46:23.383998860Z" level=info msg="CreateContainer within sandbox \"8cc73758f17205bd5c1205f6ed586462472b04d1dc0ad0de69eced2583a43247\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 00:46:23.424339 env[1406]: time="2025-05-10T00:46:23.424285126Z" level=info msg="CreateContainer within sandbox \"8cc73758f17205bd5c1205f6ed586462472b04d1dc0ad0de69eced2583a43247\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"ca9af68f0454ebc66ee75ebf0d759ef592d239d780a60f590c9a9cbaf7e586d6\"" May 10 00:46:23.425213 env[1406]: time="2025-05-10T00:46:23.425173428Z" level=info msg="StartContainer for \"ca9af68f0454ebc66ee75ebf0d759ef592d239d780a60f590c9a9cbaf7e586d6\"" May 10 00:46:23.445004 systemd[1]: Started cri-containerd-ca9af68f0454ebc66ee75ebf0d759ef592d239d780a60f590c9a9cbaf7e586d6.scope. May 10 00:46:23.464000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[2099]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f990c73ea38 items=0 ppid=2021 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361396166363866303435346562633636656537356562663064373539 May 10 00:46:23.464000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.464000 audit: BPF prog-id=67 op=LOAD May 10 00:46:23.464000 audit[2099]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00034fd58 items=0 ppid=2021 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361396166363866303435346562633636656537356562663064373539 May 10 00:46:23.465000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit: BPF prog-id=68 op=LOAD May 10 00:46:23.465000 audit[2099]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00034fda8 items=0 ppid=2021 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361396166363866303435346562633636656537356562663064373539 May 10 00:46:23.465000 audit: BPF prog-id=68 op=UNLOAD May 10 00:46:23.465000 audit: BPF prog-id=67 op=UNLOAD May 10 00:46:23.465000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.465000 audit: BPF prog-id=69 op=LOAD May 10 00:46:23.465000 audit[2099]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00034fe38 items=0 ppid=2021 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361396166363866303435346562633636656537356562663064373539 May 10 00:46:23.491631 env[1406]: time="2025-05-10T00:46:23.491583137Z" level=info msg="StartContainer for \"ca9af68f0454ebc66ee75ebf0d759ef592d239d780a60f590c9a9cbaf7e586d6\" returns successfully" May 10 00:46:23.496654 systemd[1]: cri-containerd-ca9af68f0454ebc66ee75ebf0d759ef592d239d780a60f590c9a9cbaf7e586d6.scope: Deactivated successfully. May 10 00:46:23.500000 audit: BPF prog-id=69 op=UNLOAD May 10 00:46:23.520800 kubelet[1954]: E0510 00:46:23.520765 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:23.615541 kubelet[1954]: E0510 00:46:23.610134 1954 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lxt8k" podUID="89799d19-090a-4418-ac5e-412518f2dcdb" May 10 00:46:23.630045 env[1406]: time="2025-05-10T00:46:23.630000264Z" level=info msg="shim disconnected" id=ca9af68f0454ebc66ee75ebf0d759ef592d239d780a60f590c9a9cbaf7e586d6 May 10 00:46:23.630045 env[1406]: time="2025-05-10T00:46:23.630042464Z" level=warning msg="cleaning up after shim disconnected" id=ca9af68f0454ebc66ee75ebf0d759ef592d239d780a60f590c9a9cbaf7e586d6 namespace=k8s.io May 10 00:46:23.630045 env[1406]: time="2025-05-10T00:46:23.630053864Z" level=info msg="cleaning up dead shim" May 10 00:46:23.639942 env[1406]: time="2025-05-10T00:46:23.639859480Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2139 runtime=io.containerd.runc.v2\n" May 10 00:46:23.740150 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ca9af68f0454ebc66ee75ebf0d759ef592d239d780a60f590c9a9cbaf7e586d6-rootfs.mount: Deactivated successfully. May 10 00:46:24.521760 kubelet[1954]: E0510 00:46:24.521702 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:24.705841 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount530769598.mount: Deactivated successfully. May 10 00:46:25.305870 env[1406]: time="2025-05-10T00:46:25.305815451Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:25.522468 kubelet[1954]: E0510 00:46:25.522409 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:25.610289 kubelet[1954]: E0510 00:46:25.609520 1954 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lxt8k" podUID="89799d19-090a-4418-ac5e-412518f2dcdb" May 10 00:46:25.994290 env[1406]: time="2025-05-10T00:46:25.993802143Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:26.000286 env[1406]: time="2025-05-10T00:46:26.000233453Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:26.004694 env[1406]: time="2025-05-10T00:46:26.004645659Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:26.005286 env[1406]: time="2025-05-10T00:46:26.005252060Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b\"" May 10 00:46:26.007433 env[1406]: time="2025-05-10T00:46:26.007020562Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 10 00:46:26.007831 env[1406]: time="2025-05-10T00:46:26.007804163Z" level=info msg="CreateContainer within sandbox \"dc85137359e2250f7b98692fa5edc70bf6ae6af21dc343d917f80e31ab25728f\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 10 00:46:26.040407 env[1406]: time="2025-05-10T00:46:26.040360207Z" level=info msg="CreateContainer within sandbox \"dc85137359e2250f7b98692fa5edc70bf6ae6af21dc343d917f80e31ab25728f\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"ae95b6451ecb098859a1c348114f220b24a94167a788b847ad5412e9e0adf458\"" May 10 00:46:26.041110 env[1406]: time="2025-05-10T00:46:26.041077308Z" level=info msg="StartContainer for \"ae95b6451ecb098859a1c348114f220b24a94167a788b847ad5412e9e0adf458\"" May 10 00:46:26.066212 systemd[1]: Started cri-containerd-ae95b6451ecb098859a1c348114f220b24a94167a788b847ad5412e9e0adf458.scope. May 10 00:46:26.080000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.085630 kernel: kauditd_printk_skb: 432 callbacks suppressed May 10 00:46:26.085723 kernel: audit: type=1400 audit(1746837986.080:437): avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f12f8d11628 items=0 ppid=2023 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.122485 kernel: audit: type=1300 audit(1746837986.080:437): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f12f8d11628 items=0 ppid=2023 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.140535 kernel: audit: type=1327 audit(1746837986.080:437): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165393562363435316563623039383835396131633334383131346632 May 10 00:46:26.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165393562363435316563623039383835396131633334383131346632 May 10 00:46:26.153095 kernel: audit: type=1400 audit(1746837986.080:438): avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.153949 env[1406]: time="2025-05-10T00:46:26.153849461Z" level=info msg="StartContainer for \"ae95b6451ecb098859a1c348114f220b24a94167a788b847ad5412e9e0adf458\" returns successfully" May 10 00:46:26.080000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.169903 kernel: audit: type=1400 audit(1746837986.080:438): avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.199977 kernel: audit: type=1400 audit(1746837986.080:438): avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.200093 kernel: audit: type=1400 audit(1746837986.080:438): avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.218258 kernel: audit: type=1400 audit(1746837986.080:438): avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.232903 kernel: audit: type=1400 audit(1746837986.080:438): avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.232963 kernel: audit: type=1400 audit(1746837986.080:438): avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit: BPF prog-id=70 op=LOAD May 10 00:46:26.080000 audit[2164]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f3eb8 items=0 ppid=2023 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165393562363435316563623039383835396131633334383131346632 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit: BPF prog-id=71 op=LOAD May 10 00:46:26.080000 audit[2164]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f3f08 items=0 ppid=2023 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165393562363435316563623039383835396131633334383131346632 May 10 00:46:26.080000 audit: BPF prog-id=71 op=UNLOAD May 10 00:46:26.080000 audit: BPF prog-id=70 op=UNLOAD May 10 00:46:26.080000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { perfmon } for pid=2164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit[2164]: AVC avc: denied { bpf } for pid=2164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.080000 audit: BPF prog-id=72 op=LOAD May 10 00:46:26.080000 audit[2164]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000f3f98 items=0 ppid=2023 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165393562363435316563623039383835396131633334383131346632 May 10 00:46:26.218000 audit[2217]: NETFILTER_CFG table=mangle:21 family=2 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:26.218000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd3da2ce00 a2=0 a3=7ffd3da2cdec items=0 ppid=2174 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.218000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:46:26.218000 audit[2216]: NETFILTER_CFG table=mangle:22 family=10 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.218000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffffcfb34b0 a2=0 a3=7ffffcfb349c items=0 ppid=2174 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.218000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:46:26.224000 audit[2218]: NETFILTER_CFG table=nat:23 family=2 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:26.224000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd938b0d70 a2=0 a3=7ffd938b0d5c items=0 ppid=2174 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.224000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:46:26.224000 audit[2219]: NETFILTER_CFG table=nat:24 family=10 entries=1 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.224000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd187e7f50 a2=0 a3=7ffd187e7f3c items=0 ppid=2174 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.224000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:46:26.224000 audit[2220]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:26.224000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4495c970 a2=0 a3=7fff4495c95c items=0 ppid=2174 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.224000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:46:26.224000 audit[2221]: NETFILTER_CFG table=filter:26 family=10 entries=1 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.224000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffcfc13750 a2=0 a3=7fffcfc1373c items=0 ppid=2174 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.224000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:46:26.321000 audit[2222]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:26.321000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff5ace7490 a2=0 a3=7fff5ace747c items=0 ppid=2174 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.321000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:46:26.324000 audit[2224]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:26.324000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd21665b00 a2=0 a3=7ffd21665aec items=0 ppid=2174 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.324000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 10 00:46:26.328000 audit[2227]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:26.328000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffedfcbaaa0 a2=0 a3=7ffedfcbaa8c items=0 ppid=2174 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.328000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 10 00:46:26.329000 audit[2228]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:26.329000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee7927760 a2=0 a3=7ffee792774c items=0 ppid=2174 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.329000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:46:26.331000 audit[2230]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:26.331000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffee2c0b170 a2=0 a3=7ffee2c0b15c items=0 ppid=2174 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.331000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:46:26.333000 audit[2231]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:26.333000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe92267a00 a2=0 a3=7ffe922679ec items=0 ppid=2174 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.333000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:46:26.335000 audit[2233]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:26.335000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff43278640 a2=0 a3=7fff4327862c items=0 ppid=2174 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.335000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:46:26.338000 audit[2236]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:26.338000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcf7b0c3d0 a2=0 a3=7ffcf7b0c3bc items=0 ppid=2174 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.338000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 10 00:46:26.340000 audit[2237]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:26.340000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd82f3e360 a2=0 a3=7ffd82f3e34c items=0 ppid=2174 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.340000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:46:26.342000 audit[2239]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:26.342000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff6d0c47c0 a2=0 a3=7fff6d0c47ac items=0 ppid=2174 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.342000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:46:26.343000 audit[2240]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:26.343000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe7c27f90 a2=0 a3=7fffe7c27f7c items=0 ppid=2174 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.343000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:46:26.345000 audit[2242]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:26.345000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcf3f093c0 a2=0 a3=7ffcf3f093ac items=0 ppid=2174 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.345000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:46:26.349000 audit[2245]: NETFILTER_CFG table=filter:39 family=2 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:26.349000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffff475fbe0 a2=0 a3=7ffff475fbcc items=0 ppid=2174 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.349000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:46:26.352000 audit[2248]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:26.352000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff4e22a5e0 a2=0 a3=7fff4e22a5cc items=0 ppid=2174 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.352000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:46:26.354000 audit[2249]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:26.354000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcb2968260 a2=0 a3=7ffcb296824c items=0 ppid=2174 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.354000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:46:26.356000 audit[2251]: NETFILTER_CFG table=nat:42 family=2 entries=2 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:26.356000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe0073d560 a2=0 a3=7ffe0073d54c items=0 ppid=2174 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.356000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:46:26.424000 audit[2256]: NETFILTER_CFG table=nat:43 family=2 entries=2 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:26.424000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd987a33d0 a2=0 a3=7ffd987a33bc items=0 ppid=2174 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.424000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:46:26.425000 audit[2257]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:26.425000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff91367870 a2=0 a3=7fff9136785c items=0 ppid=2174 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.425000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:46:26.427000 audit[2259]: NETFILTER_CFG table=nat:45 family=2 entries=2 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:46:26.427000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc41b82a30 a2=0 a3=7ffc41b82a1c items=0 ppid=2174 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.427000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:46:26.452000 audit[2265]: NETFILTER_CFG table=filter:46 family=2 entries=5 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:26.452000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdb0e34550 a2=0 a3=7ffdb0e3453c items=0 ppid=2174 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.452000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:26.522801 kubelet[1954]: E0510 00:46:26.522718 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:26.536000 audit[2265]: NETFILTER_CFG table=nat:47 family=2 entries=65 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:26.536000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffdb0e34550 a2=0 a3=7ffdb0e3453c items=0 ppid=2174 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.536000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:26.574000 audit[2273]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.574000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcf8c97f50 a2=0 a3=7ffcf8c97f3c items=0 ppid=2174 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.574000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:46:26.577000 audit[2275]: NETFILTER_CFG table=filter:49 family=10 entries=2 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.577000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff59828240 a2=0 a3=7fff5982822c items=0 ppid=2174 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.577000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 10 00:46:26.581000 audit[2278]: NETFILTER_CFG table=filter:50 family=10 entries=2 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.581000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc6ace6130 a2=0 a3=7ffc6ace611c items=0 ppid=2174 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.581000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 10 00:46:26.582000 audit[2279]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.582000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0dc8f5d0 a2=0 a3=7ffd0dc8f5bc items=0 ppid=2174 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.582000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:46:26.585000 audit[2281]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.585000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe26001790 a2=0 a3=7ffe2600177c items=0 ppid=2174 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.585000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:46:26.586000 audit[2282]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.586000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5e206ea0 a2=0 a3=7ffe5e206e8c items=0 ppid=2174 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.586000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:46:26.589000 audit[2284]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.589000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe28e9ab60 a2=0 a3=7ffe28e9ab4c items=0 ppid=2174 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.589000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 10 00:46:26.593000 audit[2287]: NETFILTER_CFG table=filter:55 family=10 entries=2 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.593000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffec54c20a0 a2=0 a3=7ffec54c208c items=0 ppid=2174 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.593000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:46:26.594000 audit[2288]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.594000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff53e95af0 a2=0 a3=7fff53e95adc items=0 ppid=2174 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.594000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:46:26.596000 audit[2290]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.596000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdff381120 a2=0 a3=7ffdff38110c items=0 ppid=2174 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.596000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:46:26.598000 audit[2291]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.598000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4abb03a0 a2=0 a3=7fff4abb038c items=0 ppid=2174 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.598000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:46:26.601000 audit[2293]: NETFILTER_CFG table=filter:59 family=10 entries=1 op=nft_register_rule pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.601000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffed5b2c540 a2=0 a3=7ffed5b2c52c items=0 ppid=2174 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.601000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:46:26.605000 audit[2296]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_rule pid=2296 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.605000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd0e5b3960 a2=0 a3=7ffd0e5b394c items=0 ppid=2174 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.605000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:46:26.608000 audit[2299]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.608000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc14e0bb00 a2=0 a3=7ffc14e0baec items=0 ppid=2174 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.608000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 10 00:46:26.610000 audit[2300]: NETFILTER_CFG table=nat:62 family=10 entries=1 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.610000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff6d668530 a2=0 a3=7fff6d66851c items=0 ppid=2174 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.610000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:46:26.612000 audit[2302]: NETFILTER_CFG table=nat:63 family=10 entries=2 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.612000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc43864740 a2=0 a3=7ffc4386472c items=0 ppid=2174 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.612000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:46:26.616000 audit[2305]: NETFILTER_CFG table=nat:64 family=10 entries=2 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.616000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc40342f50 a2=0 a3=7ffc40342f3c items=0 ppid=2174 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.616000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:46:26.617000 audit[2306]: NETFILTER_CFG table=nat:65 family=10 entries=1 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.617000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff87d6fbb0 a2=0 a3=7fff87d6fb9c items=0 ppid=2174 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.617000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:46:26.619000 audit[2308]: NETFILTER_CFG table=nat:66 family=10 entries=2 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.619000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdacf983f0 a2=0 a3=7ffdacf983dc items=0 ppid=2174 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.619000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:46:26.620000 audit[2309]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.620000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff381b5860 a2=0 a3=7fff381b584c items=0 ppid=2174 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.620000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:46:26.623000 audit[2311]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_rule pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.623000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdad834f90 a2=0 a3=7ffdad834f7c items=0 ppid=2174 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.623000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:46:26.628000 audit[2314]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:46:26.628000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd37e00710 a2=0 a3=7ffd37e006fc items=0 ppid=2174 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.628000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:46:26.631000 audit[2316]: NETFILTER_CFG table=filter:70 family=10 entries=3 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:46:26.631000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffd7fb7dea0 a2=0 a3=7ffd7fb7de8c items=0 ppid=2174 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.631000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:26.632000 audit[2316]: NETFILTER_CFG table=nat:71 family=10 entries=7 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:46:26.632000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd7fb7dea0 a2=0 a3=7ffd7fb7de8c items=0 ppid=2174 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.632000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:26.640844 kubelet[1954]: I0510 00:46:26.640795 1954 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-fk9rw" podStartSLOduration=3.58862615 podStartE2EDuration="7.640779319s" podCreationTimestamp="2025-05-10 00:46:19 +0000 UTC" firstStartedPulling="2025-05-10 00:46:21.953969292 +0000 UTC m=+3.120131076" lastFinishedPulling="2025-05-10 00:46:26.006122461 +0000 UTC m=+7.172284245" observedRunningTime="2025-05-10 00:46:26.640259218 +0000 UTC m=+7.806421102" watchObservedRunningTime="2025-05-10 00:46:26.640779319 +0000 UTC m=+7.806941103" May 10 00:46:27.523826 kubelet[1954]: E0510 00:46:27.523776 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:27.610598 kubelet[1954]: E0510 00:46:27.610092 1954 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lxt8k" podUID="89799d19-090a-4418-ac5e-412518f2dcdb" May 10 00:46:28.524166 kubelet[1954]: E0510 00:46:28.524085 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:29.524907 kubelet[1954]: E0510 00:46:29.524839 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:29.611252 kubelet[1954]: E0510 00:46:29.610851 1954 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lxt8k" podUID="89799d19-090a-4418-ac5e-412518f2dcdb" May 10 00:46:30.220657 env[1406]: time="2025-05-10T00:46:30.220609030Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:30.225684 env[1406]: time="2025-05-10T00:46:30.225642763Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:30.228842 env[1406]: time="2025-05-10T00:46:30.228797283Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:30.232032 env[1406]: time="2025-05-10T00:46:30.231998104Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:30.232485 env[1406]: time="2025-05-10T00:46:30.232451907Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 10 00:46:30.234838 env[1406]: time="2025-05-10T00:46:30.234805922Z" level=info msg="CreateContainer within sandbox \"8cc73758f17205bd5c1205f6ed586462472b04d1dc0ad0de69eced2583a43247\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 00:46:30.275578 env[1406]: time="2025-05-10T00:46:30.275525785Z" level=info msg="CreateContainer within sandbox \"8cc73758f17205bd5c1205f6ed586462472b04d1dc0ad0de69eced2583a43247\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"748d07c48dec69cd6c8125815eac1969952b1583aa5d6254af293a0e9ce6154f\"" May 10 00:46:30.276253 env[1406]: time="2025-05-10T00:46:30.276153489Z" level=info msg="StartContainer for \"748d07c48dec69cd6c8125815eac1969952b1583aa5d6254af293a0e9ce6154f\"" May 10 00:46:30.305026 systemd[1]: run-containerd-runc-k8s.io-748d07c48dec69cd6c8125815eac1969952b1583aa5d6254af293a0e9ce6154f-runc.8FMtZV.mount: Deactivated successfully. May 10 00:46:30.311196 systemd[1]: Started cri-containerd-748d07c48dec69cd6c8125815eac1969952b1583aa5d6254af293a0e9ce6154f.scope. May 10 00:46:30.323000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f14782af5f8 items=0 ppid=2021 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:30.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734386430376334386465633639636436633831323538313565616331 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit: BPF prog-id=73 op=LOAD May 10 00:46:30.323000 audit[2325]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000230b78 items=0 ppid=2021 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:30.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734386430376334386465633639636436633831323538313565616331 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit: BPF prog-id=74 op=LOAD May 10 00:46:30.323000 audit[2325]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000230bc8 items=0 ppid=2021 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:30.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734386430376334386465633639636436633831323538313565616331 May 10 00:46:30.323000 audit: BPF prog-id=74 op=UNLOAD May 10 00:46:30.323000 audit: BPF prog-id=73 op=UNLOAD May 10 00:46:30.323000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:30.323000 audit: BPF prog-id=75 op=LOAD May 10 00:46:30.323000 audit[2325]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000230c58 items=0 ppid=2021 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:30.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734386430376334386465633639636436633831323538313565616331 May 10 00:46:30.344148 env[1406]: time="2025-05-10T00:46:30.344084028Z" level=info msg="StartContainer for \"748d07c48dec69cd6c8125815eac1969952b1583aa5d6254af293a0e9ce6154f\" returns successfully" May 10 00:46:30.525604 kubelet[1954]: E0510 00:46:30.525551 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:31.527496 kubelet[1954]: E0510 00:46:31.527448 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:31.610815 kubelet[1954]: E0510 00:46:31.610755 1954 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-lxt8k" podUID="89799d19-090a-4418-ac5e-412518f2dcdb" May 10 00:46:31.786663 env[1406]: time="2025-05-10T00:46:31.786523414Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:46:31.788991 systemd[1]: cri-containerd-748d07c48dec69cd6c8125815eac1969952b1583aa5d6254af293a0e9ce6154f.scope: Deactivated successfully. May 10 00:46:31.805919 kernel: kauditd_printk_skb: 229 callbacks suppressed May 10 00:46:31.806025 kernel: audit: type=1334 audit(1746837991.791:500): prog-id=75 op=UNLOAD May 10 00:46:31.791000 audit: BPF prog-id=75 op=UNLOAD May 10 00:46:31.831175 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-748d07c48dec69cd6c8125815eac1969952b1583aa5d6254af293a0e9ce6154f-rootfs.mount: Deactivated successfully. May 10 00:46:31.838460 kubelet[1954]: I0510 00:46:31.838219 1954 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 10 00:46:32.527957 kubelet[1954]: E0510 00:46:32.527902 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:33.528929 kubelet[1954]: E0510 00:46:33.528863 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:33.615529 systemd[1]: Created slice kubepods-besteffort-pod89799d19_090a_4418_ac5e_412518f2dcdb.slice. May 10 00:46:33.618462 env[1406]: time="2025-05-10T00:46:33.618422452Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lxt8k,Uid:89799d19-090a-4418-ac5e-412518f2dcdb,Namespace:calico-system,Attempt:0,}" May 10 00:46:34.236369 env[1406]: time="2025-05-10T00:46:34.236321289Z" level=info msg="shim disconnected" id=748d07c48dec69cd6c8125815eac1969952b1583aa5d6254af293a0e9ce6154f May 10 00:46:34.236369 env[1406]: time="2025-05-10T00:46:34.236366290Z" level=warning msg="cleaning up after shim disconnected" id=748d07c48dec69cd6c8125815eac1969952b1583aa5d6254af293a0e9ce6154f namespace=k8s.io May 10 00:46:34.236369 env[1406]: time="2025-05-10T00:46:34.236376290Z" level=info msg="cleaning up dead shim" May 10 00:46:34.254671 env[1406]: time="2025-05-10T00:46:34.254636595Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2367 runtime=io.containerd.runc.v2\n" May 10 00:46:34.304258 env[1406]: time="2025-05-10T00:46:34.304179882Z" level=error msg="Failed to destroy network for sandbox \"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:34.306455 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed-shm.mount: Deactivated successfully. May 10 00:46:34.307857 env[1406]: time="2025-05-10T00:46:34.307807003Z" level=error msg="encountered an error cleaning up failed sandbox \"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:34.308004 env[1406]: time="2025-05-10T00:46:34.307895603Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lxt8k,Uid:89799d19-090a-4418-ac5e-412518f2dcdb,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:34.308557 kubelet[1954]: E0510 00:46:34.308186 1954 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:34.308557 kubelet[1954]: E0510 00:46:34.308256 1954 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-lxt8k" May 10 00:46:34.308557 kubelet[1954]: E0510 00:46:34.308278 1954 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-lxt8k" May 10 00:46:34.308722 kubelet[1954]: E0510 00:46:34.308331 1954 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-lxt8k_calico-system(89799d19-090a-4418-ac5e-412518f2dcdb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-lxt8k_calico-system(89799d19-090a-4418-ac5e-412518f2dcdb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-lxt8k" podUID="89799d19-090a-4418-ac5e-412518f2dcdb" May 10 00:46:34.529659 kubelet[1954]: E0510 00:46:34.529605 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:34.645680 kubelet[1954]: I0510 00:46:34.645649 1954 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" May 10 00:46:34.646582 env[1406]: time="2025-05-10T00:46:34.646535763Z" level=info msg="StopPodSandbox for \"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed\"" May 10 00:46:34.649864 env[1406]: time="2025-05-10T00:46:34.649810181Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 10 00:46:34.676992 env[1406]: time="2025-05-10T00:46:34.676931938Z" level=error msg="StopPodSandbox for \"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed\" failed" error="failed to destroy network for sandbox \"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:34.677336 kubelet[1954]: E0510 00:46:34.677303 1954 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" May 10 00:46:34.677437 kubelet[1954]: E0510 00:46:34.677374 1954 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed"} May 10 00:46:34.677491 kubelet[1954]: E0510 00:46:34.677457 1954 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"89799d19-090a-4418-ac5e-412518f2dcdb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:46:34.677571 kubelet[1954]: E0510 00:46:34.677489 1954 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"89799d19-090a-4418-ac5e-412518f2dcdb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-lxt8k" podUID="89799d19-090a-4418-ac5e-412518f2dcdb" May 10 00:46:34.997383 kubelet[1954]: I0510 00:46:34.996832 1954 topology_manager.go:215] "Topology Admit Handler" podUID="80c87108-bd28-459d-8a12-55aed7e7bc08" podNamespace="default" podName="nginx-deployment-85f456d6dd-sccv4" May 10 00:46:35.002709 systemd[1]: Created slice kubepods-besteffort-pod80c87108_bd28_459d_8a12_55aed7e7bc08.slice. May 10 00:46:35.068210 kubelet[1954]: I0510 00:46:35.068149 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7b88p\" (UniqueName: \"kubernetes.io/projected/80c87108-bd28-459d-8a12-55aed7e7bc08-kube-api-access-7b88p\") pod \"nginx-deployment-85f456d6dd-sccv4\" (UID: \"80c87108-bd28-459d-8a12-55aed7e7bc08\") " pod="default/nginx-deployment-85f456d6dd-sccv4" May 10 00:46:35.306996 env[1406]: time="2025-05-10T00:46:35.306935935Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-sccv4,Uid:80c87108-bd28-459d-8a12-55aed7e7bc08,Namespace:default,Attempt:0,}" May 10 00:46:35.404378 env[1406]: time="2025-05-10T00:46:35.404311083Z" level=error msg="Failed to destroy network for sandbox \"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:35.406565 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162-shm.mount: Deactivated successfully. May 10 00:46:35.407777 env[1406]: time="2025-05-10T00:46:35.407730102Z" level=error msg="encountered an error cleaning up failed sandbox \"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:35.407929 env[1406]: time="2025-05-10T00:46:35.407799403Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-sccv4,Uid:80c87108-bd28-459d-8a12-55aed7e7bc08,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:35.408092 kubelet[1954]: E0510 00:46:35.408057 1954 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:35.408182 kubelet[1954]: E0510 00:46:35.408121 1954 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-sccv4" May 10 00:46:35.408182 kubelet[1954]: E0510 00:46:35.408149 1954 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-sccv4" May 10 00:46:35.408266 kubelet[1954]: E0510 00:46:35.408198 1954 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-sccv4_default(80c87108-bd28-459d-8a12-55aed7e7bc08)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-sccv4_default(80c87108-bd28-459d-8a12-55aed7e7bc08)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-sccv4" podUID="80c87108-bd28-459d-8a12-55aed7e7bc08" May 10 00:46:35.530302 kubelet[1954]: E0510 00:46:35.530252 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:35.650775 kubelet[1954]: I0510 00:46:35.650648 1954 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" May 10 00:46:35.652249 env[1406]: time="2025-05-10T00:46:35.651852876Z" level=info msg="StopPodSandbox for \"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162\"" May 10 00:46:35.682684 env[1406]: time="2025-05-10T00:46:35.682615849Z" level=error msg="StopPodSandbox for \"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162\" failed" error="failed to destroy network for sandbox \"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:46:35.683131 kubelet[1954]: E0510 00:46:35.683095 1954 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" May 10 00:46:35.683274 kubelet[1954]: E0510 00:46:35.683144 1954 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162"} May 10 00:46:35.683274 kubelet[1954]: E0510 00:46:35.683190 1954 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"80c87108-bd28-459d-8a12-55aed7e7bc08\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:46:35.683274 kubelet[1954]: E0510 00:46:35.683219 1954 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"80c87108-bd28-459d-8a12-55aed7e7bc08\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-sccv4" podUID="80c87108-bd28-459d-8a12-55aed7e7bc08" May 10 00:46:36.531102 kubelet[1954]: E0510 00:46:36.531043 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:37.531235 kubelet[1954]: E0510 00:46:37.531184 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:38.532136 kubelet[1954]: E0510 00:46:38.532093 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:39.509846 kubelet[1954]: E0510 00:46:39.509798 1954 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:39.533165 kubelet[1954]: E0510 00:46:39.533117 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:40.534309 kubelet[1954]: E0510 00:46:40.534266 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:40.937808 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3471495505.mount: Deactivated successfully. May 10 00:46:40.991779 env[1406]: time="2025-05-10T00:46:40.991723147Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:40.999248 env[1406]: time="2025-05-10T00:46:40.999207884Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:41.009260 env[1406]: time="2025-05-10T00:46:41.009167832Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:41.015423 env[1406]: time="2025-05-10T00:46:41.015380361Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:41.015905 env[1406]: time="2025-05-10T00:46:41.015857264Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 10 00:46:41.038178 env[1406]: time="2025-05-10T00:46:41.038132370Z" level=info msg="CreateContainer within sandbox \"8cc73758f17205bd5c1205f6ed586462472b04d1dc0ad0de69eced2583a43247\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 00:46:41.064128 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1401527916.mount: Deactivated successfully. May 10 00:46:41.081532 env[1406]: time="2025-05-10T00:46:41.081476678Z" level=info msg="CreateContainer within sandbox \"8cc73758f17205bd5c1205f6ed586462472b04d1dc0ad0de69eced2583a43247\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"fdde6be3f29cafb2e699c4d92018dd2af569078a7c1c59574e94095d5dfcd87f\"" May 10 00:46:41.082130 env[1406]: time="2025-05-10T00:46:41.082097381Z" level=info msg="StartContainer for \"fdde6be3f29cafb2e699c4d92018dd2af569078a7c1c59574e94095d5dfcd87f\"" May 10 00:46:41.099309 systemd[1]: Started cri-containerd-fdde6be3f29cafb2e699c4d92018dd2af569078a7c1c59574e94095d5dfcd87f.scope. May 10 00:46:41.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7ff3f8403e88 items=0 ppid=2021 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:41.157720 kernel: audit: type=1400 audit(1746838001.121:501): avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.158024 kernel: audit: type=1300 audit(1746838001.121:501): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7ff3f8403e88 items=0 ppid=2021 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:41.158053 kernel: audit: type=1327 audit(1746838001.121:501): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664646536626533663239636166623265363939633464393230313864 May 10 00:46:41.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664646536626533663239636166623265363939633464393230313864 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.208329 kernel: audit: type=1400 audit(1746838001.121:502): avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.208483 kernel: audit: type=1400 audit(1746838001.121:502): avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.208509 kernel: audit: type=1400 audit(1746838001.121:502): avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.208807 env[1406]: time="2025-05-10T00:46:41.208765786Z" level=info msg="StartContainer for \"fdde6be3f29cafb2e699c4d92018dd2af569078a7c1c59574e94095d5dfcd87f\" returns successfully" May 10 00:46:41.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.241685 kernel: audit: type=1400 audit(1746838001.121:502): avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.303908 kernel: audit: type=1400 audit(1746838001.121:502): avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.304093 kernel: audit: type=1400 audit(1746838001.121:502): avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.304195 kernel: audit: type=1400 audit(1746838001.121:502): avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit: BPF prog-id=76 op=LOAD May 10 00:46:41.121000 audit[2487]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c0002e5f98 items=0 ppid=2021 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:41.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664646536626533663239636166623265363939633464393230313864 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit: BPF prog-id=77 op=LOAD May 10 00:46:41.121000 audit[2487]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c0002e5fe8 items=0 ppid=2021 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:41.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664646536626533663239636166623265363939633464393230313864 May 10 00:46:41.121000 audit: BPF prog-id=77 op=UNLOAD May 10 00:46:41.121000 audit: BPF prog-id=76 op=UNLOAD May 10 00:46:41.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:41.121000 audit: BPF prog-id=78 op=LOAD May 10 00:46:41.121000 audit[2487]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c0003c8078 items=0 ppid=2021 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:41.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664646536626533663239636166623265363939633464393230313864 May 10 00:46:41.509874 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 10 00:46:41.510040 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 10 00:46:41.535563 kubelet[1954]: E0510 00:46:41.535502 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:41.677965 kubelet[1954]: I0510 00:46:41.677401 1954 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-vmngv" podStartSLOduration=3.61311185 podStartE2EDuration="22.677356428s" podCreationTimestamp="2025-05-10 00:46:19 +0000 UTC" firstStartedPulling="2025-05-10 00:46:21.95259899 +0000 UTC m=+3.118760774" lastFinishedPulling="2025-05-10 00:46:41.016843468 +0000 UTC m=+22.183005352" observedRunningTime="2025-05-10 00:46:41.677161627 +0000 UTC m=+22.843323411" watchObservedRunningTime="2025-05-10 00:46:41.677356428 +0000 UTC m=+22.843518212" May 10 00:46:42.536242 kubelet[1954]: E0510 00:46:42.536190 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:42.803000 audit[2626]: AVC avc: denied { write } for pid=2626 comm="tee" name="fd" dev="proc" ino=23486 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:42.803000 audit[2626]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd1b2ca09 a2=241 a3=1b6 items=1 ppid=2594 pid=2626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:42.803000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 00:46:42.803000 audit: PATH item=0 name="/dev/fd/63" inode=23470 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:42.806000 audit[2629]: AVC avc: denied { write } for pid=2629 comm="tee" name="fd" dev="proc" ino=23490 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:42.806000 audit[2629]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4383ba19 a2=241 a3=1b6 items=1 ppid=2599 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:42.806000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 00:46:42.806000 audit: PATH item=0 name="/dev/fd/63" inode=23602 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:42.806000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:42.803000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:42.818000 audit[2637]: AVC avc: denied { write } for pid=2637 comm="tee" name="fd" dev="proc" ino=23499 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:42.818000 audit[2637]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff04585a1b a2=241 a3=1b6 items=1 ppid=2597 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:42.818000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 00:46:42.818000 audit: PATH item=0 name="/dev/fd/63" inode=23481 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:42.818000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:42.820000 audit[2655]: AVC avc: denied { write } for pid=2655 comm="tee" name="fd" dev="proc" ino=23503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:42.820000 audit[2655]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeb371da1a a2=241 a3=1b6 items=1 ppid=2593 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:42.820000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 00:46:42.820000 audit: PATH item=0 name="/dev/fd/63" inode=23493 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:42.820000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:42.821000 audit[2647]: AVC avc: denied { write } for pid=2647 comm="tee" name="fd" dev="proc" ino=23507 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:42.821000 audit[2647]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf76dea19 a2=241 a3=1b6 items=1 ppid=2609 pid=2647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:42.821000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 00:46:42.821000 audit: PATH item=0 name="/dev/fd/63" inode=23606 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:42.821000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:42.824000 audit[2659]: AVC avc: denied { write } for pid=2659 comm="tee" name="fd" dev="proc" ino=23511 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:42.824000 audit[2659]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe70c2aa19 a2=241 a3=1b6 items=1 ppid=2606 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:42.824000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 00:46:42.824000 audit: PATH item=0 name="/dev/fd/63" inode=23496 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:42.824000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:42.826000 audit[2653]: AVC avc: denied { write } for pid=2653 comm="tee" name="fd" dev="proc" ino=23613 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:42.826000 audit[2653]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffd9ba9a0a a2=241 a3=1b6 items=1 ppid=2604 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:42.826000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 00:46:42.826000 audit: PATH item=0 name="/dev/fd/63" inode=23492 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:42.826000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:42.999000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:42.999000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:42.999000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:42.999000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:42.999000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:42.999000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:42.999000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:42.999000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:42.999000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:42.999000 audit: BPF prog-id=79 op=LOAD May 10 00:46:42.999000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffccfee4ef0 a2=98 a3=3 items=0 ppid=2611 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:42.999000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:42.999000 audit: BPF prog-id=79 op=UNLOAD May 10 00:46:43.000000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.000000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.000000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.000000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.000000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.000000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.000000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.000000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.000000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.000000 audit: BPF prog-id=80 op=LOAD May 10 00:46:43.000000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffccfee4cd0 a2=74 a3=540051 items=0 ppid=2611 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.000000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:43.000000 audit: BPF prog-id=80 op=UNLOAD May 10 00:46:43.000000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.000000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.000000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.000000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.000000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.000000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.000000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.000000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.000000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.000000 audit: BPF prog-id=81 op=LOAD May 10 00:46:43.000000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffccfee4d00 a2=94 a3=2 items=0 ppid=2611 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.000000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:43.000000 audit: BPF prog-id=81 op=UNLOAD May 10 00:46:43.129000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.129000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.129000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.129000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.129000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.129000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.129000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.129000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.129000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.129000 audit: BPF prog-id=82 op=LOAD May 10 00:46:43.129000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffccfee4bc0 a2=40 a3=1 items=0 ppid=2611 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.129000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:43.129000 audit: BPF prog-id=82 op=UNLOAD May 10 00:46:43.129000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.129000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffccfee4c90 a2=50 a3=7ffccfee4d70 items=0 ppid=2611 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.129000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:43.139000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.139000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffccfee4bd0 a2=28 a3=0 items=0 ppid=2611 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.139000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:43.139000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.139000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffccfee4c00 a2=28 a3=0 items=0 ppid=2611 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.139000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:43.139000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.139000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffccfee4b10 a2=28 a3=0 items=0 ppid=2611 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.139000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:43.139000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.139000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffccfee4c20 a2=28 a3=0 items=0 ppid=2611 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.139000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:43.139000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.139000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffccfee4c00 a2=28 a3=0 items=0 ppid=2611 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.139000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:43.139000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.139000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffccfee4bf0 a2=28 a3=0 items=0 ppid=2611 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.139000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:43.139000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.139000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffccfee4c20 a2=28 a3=0 items=0 ppid=2611 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.139000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:43.139000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.139000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffccfee4c00 a2=28 a3=0 items=0 ppid=2611 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.139000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:43.139000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.139000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffccfee4c20 a2=28 a3=0 items=0 ppid=2611 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.139000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:43.139000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.139000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffccfee4bf0 a2=28 a3=0 items=0 ppid=2611 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.139000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:43.139000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.139000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffccfee4c60 a2=28 a3=0 items=0 ppid=2611 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.139000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:43.139000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.139000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffccfee4a10 a2=50 a3=1 items=0 ppid=2611 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.139000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:43.139000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.139000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.139000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.139000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.139000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.139000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.139000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.139000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.139000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.139000 audit: BPF prog-id=83 op=LOAD May 10 00:46:43.139000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffccfee4a10 a2=94 a3=5 items=0 ppid=2611 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.139000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:43.139000 audit: BPF prog-id=83 op=UNLOAD May 10 00:46:43.139000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.139000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffccfee4ac0 a2=50 a3=1 items=0 ppid=2611 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.139000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:43.140000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffccfee4be0 a2=4 a3=38 items=0 ppid=2611 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.140000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:43.140000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { confidentiality } for pid=2689 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:43.140000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffccfee4c30 a2=94 a3=6 items=0 ppid=2611 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.140000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:43.140000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { confidentiality } for pid=2689 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:43.140000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffccfee43e0 a2=94 a3=83 items=0 ppid=2611 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.140000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:43.140000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.140000 audit[2689]: AVC avc: denied { confidentiality } for pid=2689 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:43.140000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffccfee43e0 a2=94 a3=83 items=0 ppid=2611 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.140000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:43.149000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit: BPF prog-id=84 op=LOAD May 10 00:46:43.149000 audit[2708]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe3b4e5300 a2=98 a3=1999999999999999 items=0 ppid=2611 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.149000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:46:43.149000 audit: BPF prog-id=84 op=UNLOAD May 10 00:46:43.149000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit: BPF prog-id=85 op=LOAD May 10 00:46:43.149000 audit[2708]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe3b4e51e0 a2=74 a3=ffff items=0 ppid=2611 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.149000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:46:43.149000 audit: BPF prog-id=85 op=UNLOAD May 10 00:46:43.149000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.149000 audit: BPF prog-id=86 op=LOAD May 10 00:46:43.149000 audit[2708]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe3b4e5220 a2=40 a3=7ffe3b4e5400 items=0 ppid=2611 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.149000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:46:43.149000 audit: BPF prog-id=86 op=UNLOAD May 10 00:46:43.214113 systemd-networkd[1554]: vxlan.calico: Link UP May 10 00:46:43.214123 systemd-networkd[1554]: vxlan.calico: Gained carrier May 10 00:46:43.236000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.236000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.236000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.236000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.236000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.236000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.236000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.236000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.236000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.236000 audit: BPF prog-id=87 op=LOAD May 10 00:46:43.236000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd1b753b40 a2=98 a3=ffffffff items=0 ppid=2611 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.236000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:43.236000 audit: BPF prog-id=87 op=UNLOAD May 10 00:46:43.236000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.236000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.236000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.236000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.236000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.236000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.236000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.236000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.236000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.236000 audit: BPF prog-id=88 op=LOAD May 10 00:46:43.236000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd1b753950 a2=74 a3=540051 items=0 ppid=2611 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.236000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:43.238000 audit: BPF prog-id=88 op=UNLOAD May 10 00:46:43.238000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit: BPF prog-id=89 op=LOAD May 10 00:46:43.238000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd1b753980 a2=94 a3=2 items=0 ppid=2611 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:43.238000 audit: BPF prog-id=89 op=UNLOAD May 10 00:46:43.238000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd1b753850 a2=28 a3=0 items=0 ppid=2611 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1b753880 a2=28 a3=0 items=0 ppid=2611 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1b753790 a2=28 a3=0 items=0 ppid=2611 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd1b7538a0 a2=28 a3=0 items=0 ppid=2611 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd1b753880 a2=28 a3=0 items=0 ppid=2611 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd1b753870 a2=28 a3=0 items=0 ppid=2611 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd1b7538a0 a2=28 a3=0 items=0 ppid=2611 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1b753880 a2=28 a3=0 items=0 ppid=2611 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1b7538a0 a2=28 a3=0 items=0 ppid=2611 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1b753870 a2=28 a3=0 items=0 ppid=2611 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd1b7538e0 a2=28 a3=0 items=0 ppid=2611 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.238000 audit: BPF prog-id=90 op=LOAD May 10 00:46:43.238000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd1b753750 a2=40 a3=0 items=0 ppid=2611 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.238000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:43.238000 audit: BPF prog-id=90 op=UNLOAD May 10 00:46:43.239000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.239000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd1b753740 a2=50 a3=2800 items=0 ppid=2611 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.239000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:43.239000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.239000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd1b753740 a2=50 a3=2800 items=0 ppid=2611 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.239000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:43.239000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.239000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.239000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.239000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.239000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.239000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.239000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.239000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.239000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.239000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.239000 audit: BPF prog-id=91 op=LOAD May 10 00:46:43.239000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd1b752f60 a2=94 a3=2 items=0 ppid=2611 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.239000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:43.239000 audit: BPF prog-id=91 op=UNLOAD May 10 00:46:43.239000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.239000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.239000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.239000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.239000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.239000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.239000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.239000 audit[2735]: AVC avc: denied { perfmon } for pid=2735 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.239000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.239000 audit[2735]: AVC avc: denied { bpf } for pid=2735 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.239000 audit: BPF prog-id=92 op=LOAD May 10 00:46:43.239000 audit[2735]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd1b753060 a2=94 a3=30 items=0 ppid=2611 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.239000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:43.242000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.242000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.242000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.242000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.242000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.242000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.242000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.242000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.242000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.242000 audit: BPF prog-id=93 op=LOAD May 10 00:46:43.242000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc44441a50 a2=98 a3=0 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.242000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.242000 audit: BPF prog-id=93 op=UNLOAD May 10 00:46:43.243000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.243000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.243000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.243000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.243000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.243000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.243000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.243000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.243000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.243000 audit: BPF prog-id=94 op=LOAD May 10 00:46:43.243000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc44441830 a2=74 a3=540051 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.243000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.243000 audit: BPF prog-id=94 op=UNLOAD May 10 00:46:43.243000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.243000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.243000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.243000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.243000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.243000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.243000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.243000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.243000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.243000 audit: BPF prog-id=95 op=LOAD May 10 00:46:43.243000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc44441860 a2=94 a3=2 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.243000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.243000 audit: BPF prog-id=95 op=UNLOAD May 10 00:46:43.369000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.369000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.369000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.369000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.369000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.369000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.369000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.369000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.369000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.369000 audit: BPF prog-id=96 op=LOAD May 10 00:46:43.369000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc44441720 a2=40 a3=1 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.369000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.369000 audit: BPF prog-id=96 op=UNLOAD May 10 00:46:43.369000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.369000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc444417f0 a2=50 a3=7ffc444418d0 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.369000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.378000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.378000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc44441730 a2=28 a3=0 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.378000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.378000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.378000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc44441760 a2=28 a3=0 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.378000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.378000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.378000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc44441670 a2=28 a3=0 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.378000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.378000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.378000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc44441780 a2=28 a3=0 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.378000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.378000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.378000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc44441760 a2=28 a3=0 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.378000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.378000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.378000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc44441750 a2=28 a3=0 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.378000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.378000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.378000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc44441780 a2=28 a3=0 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.378000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.378000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.378000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc44441760 a2=28 a3=0 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.378000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.378000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.378000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc44441780 a2=28 a3=0 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.378000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.378000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.378000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc44441750 a2=28 a3=0 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.378000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.378000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.378000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc444417c0 a2=28 a3=0 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.378000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc44441570 a2=50 a3=1 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.379000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit: BPF prog-id=97 op=LOAD May 10 00:46:43.379000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc44441570 a2=94 a3=5 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.379000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.379000 audit: BPF prog-id=97 op=UNLOAD May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc44441620 a2=50 a3=1 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.379000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc44441740 a2=4 a3=38 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.379000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { confidentiality } for pid=2738 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:43.379000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc44441790 a2=94 a3=6 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.379000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { confidentiality } for pid=2738 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:43.379000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc44440f40 a2=94 a3=83 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.379000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: AVC avc: denied { perfmon } for pid=2738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.379000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc44440f40 a2=94 a3=83 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.379000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.380000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.380000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc44442980 a2=10 a3=f1f00800 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.380000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.380000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc44442820 a2=10 a3=3 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.380000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.380000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc444427c0 a2=10 a3=3 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.380000 audit[2738]: AVC avc: denied { bpf } for pid=2738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:43.380000 audit[2738]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc444427c0 a2=10 a3=7 items=0 ppid=2611 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.380000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:43.388000 audit: BPF prog-id=92 op=UNLOAD May 10 00:46:43.508000 audit[2763]: NETFILTER_CFG table=mangle:72 family=2 entries=16 op=nft_register_chain pid=2763 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:43.508000 audit[2763]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff7be251c0 a2=0 a3=7fff7be251ac items=0 ppid=2611 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.508000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:43.537225 kubelet[1954]: E0510 00:46:43.537187 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:43.545000 audit[2764]: NETFILTER_CFG table=raw:73 family=2 entries=21 op=nft_register_chain pid=2764 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:43.545000 audit[2764]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe79553040 a2=0 a3=7ffe7955302c items=0 ppid=2611 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.545000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:43.565000 audit[2766]: NETFILTER_CFG table=nat:74 family=2 entries=15 op=nft_register_chain pid=2766 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:43.565000 audit[2766]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffeff6f4540 a2=0 a3=7ffeff6f452c items=0 ppid=2611 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.565000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:43.566000 audit[2765]: NETFILTER_CFG table=filter:75 family=2 entries=39 op=nft_register_chain pid=2765 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:43.566000 audit[2765]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe2045a330 a2=0 a3=7ffe2045a31c items=0 ppid=2611 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.566000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:44.537629 kubelet[1954]: E0510 00:46:44.537574 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:44.847085 systemd-networkd[1554]: vxlan.calico: Gained IPv6LL May 10 00:46:45.538798 kubelet[1954]: E0510 00:46:45.538740 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:45.612096 env[1406]: time="2025-05-10T00:46:45.611576217Z" level=info msg="StopPodSandbox for \"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed\"" May 10 00:46:45.713686 env[1406]: 2025-05-10 00:46:45.670 [INFO][2794] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" May 10 00:46:45.713686 env[1406]: 2025-05-10 00:46:45.670 [INFO][2794] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" iface="eth0" netns="/var/run/netns/cni-fb381adb-1ab5-94f6-cd81-e107abced731" May 10 00:46:45.713686 env[1406]: 2025-05-10 00:46:45.670 [INFO][2794] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" iface="eth0" netns="/var/run/netns/cni-fb381adb-1ab5-94f6-cd81-e107abced731" May 10 00:46:45.713686 env[1406]: 2025-05-10 00:46:45.670 [INFO][2794] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" iface="eth0" netns="/var/run/netns/cni-fb381adb-1ab5-94f6-cd81-e107abced731" May 10 00:46:45.713686 env[1406]: 2025-05-10 00:46:45.670 [INFO][2794] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" May 10 00:46:45.713686 env[1406]: 2025-05-10 00:46:45.670 [INFO][2794] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" May 10 00:46:45.713686 env[1406]: 2025-05-10 00:46:45.702 [INFO][2802] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" HandleID="k8s-pod-network.930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" Workload="10.200.8.32-k8s-csi--node--driver--lxt8k-eth0" May 10 00:46:45.713686 env[1406]: 2025-05-10 00:46:45.702 [INFO][2802] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:45.713686 env[1406]: 2025-05-10 00:46:45.703 [INFO][2802] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:45.713686 env[1406]: 2025-05-10 00:46:45.708 [WARNING][2802] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" HandleID="k8s-pod-network.930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" Workload="10.200.8.32-k8s-csi--node--driver--lxt8k-eth0" May 10 00:46:45.713686 env[1406]: 2025-05-10 00:46:45.708 [INFO][2802] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" HandleID="k8s-pod-network.930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" Workload="10.200.8.32-k8s-csi--node--driver--lxt8k-eth0" May 10 00:46:45.713686 env[1406]: 2025-05-10 00:46:45.710 [INFO][2802] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:45.713686 env[1406]: 2025-05-10 00:46:45.712 [INFO][2794] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" May 10 00:46:45.714467 env[1406]: time="2025-05-10T00:46:45.714419060Z" level=info msg="TearDown network for sandbox \"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed\" successfully" May 10 00:46:45.714605 env[1406]: time="2025-05-10T00:46:45.714585060Z" level=info msg="StopPodSandbox for \"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed\" returns successfully" May 10 00:46:45.716284 systemd[1]: run-netns-cni\x2dfb381adb\x2d1ab5\x2d94f6\x2dcd81\x2de107abced731.mount: Deactivated successfully. May 10 00:46:45.719515 env[1406]: time="2025-05-10T00:46:45.719477582Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lxt8k,Uid:89799d19-090a-4418-ac5e-412518f2dcdb,Namespace:calico-system,Attempt:1,}" May 10 00:46:45.874930 systemd-networkd[1554]: cali913a28ebd19: Link UP May 10 00:46:45.896868 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:46:45.897033 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali913a28ebd19: link becomes ready May 10 00:46:45.897929 systemd-networkd[1554]: cali913a28ebd19: Gained carrier May 10 00:46:45.919847 env[1406]: 2025-05-10 00:46:45.795 [INFO][2809] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.32-k8s-csi--node--driver--lxt8k-eth0 csi-node-driver- calico-system 89799d19-090a-4418-ac5e-412518f2dcdb 1200 0 2025-05-10 00:46:19 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.200.8.32 csi-node-driver-lxt8k eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali913a28ebd19 [] []}} ContainerID="593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733" Namespace="calico-system" Pod="csi-node-driver-lxt8k" WorkloadEndpoint="10.200.8.32-k8s-csi--node--driver--lxt8k-" May 10 00:46:45.919847 env[1406]: 2025-05-10 00:46:45.796 [INFO][2809] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733" Namespace="calico-system" Pod="csi-node-driver-lxt8k" WorkloadEndpoint="10.200.8.32-k8s-csi--node--driver--lxt8k-eth0" May 10 00:46:45.919847 env[1406]: 2025-05-10 00:46:45.825 [INFO][2822] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733" HandleID="k8s-pod-network.593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733" Workload="10.200.8.32-k8s-csi--node--driver--lxt8k-eth0" May 10 00:46:45.919847 env[1406]: 2025-05-10 00:46:45.840 [INFO][2822] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733" HandleID="k8s-pod-network.593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733" Workload="10.200.8.32-k8s-csi--node--driver--lxt8k-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000365930), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.8.32", "pod":"csi-node-driver-lxt8k", "timestamp":"2025-05-10 00:46:45.825777739 +0000 UTC"}, Hostname:"10.200.8.32", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:46:45.919847 env[1406]: 2025-05-10 00:46:45.840 [INFO][2822] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:45.919847 env[1406]: 2025-05-10 00:46:45.840 [INFO][2822] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:45.919847 env[1406]: 2025-05-10 00:46:45.840 [INFO][2822] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.32' May 10 00:46:45.919847 env[1406]: 2025-05-10 00:46:45.841 [INFO][2822] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733" host="10.200.8.32" May 10 00:46:45.919847 env[1406]: 2025-05-10 00:46:45.845 [INFO][2822] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.32" May 10 00:46:45.919847 env[1406]: 2025-05-10 00:46:45.849 [INFO][2822] ipam/ipam.go 489: Trying affinity for 192.168.124.128/26 host="10.200.8.32" May 10 00:46:45.919847 env[1406]: 2025-05-10 00:46:45.850 [INFO][2822] ipam/ipam.go 155: Attempting to load block cidr=192.168.124.128/26 host="10.200.8.32" May 10 00:46:45.919847 env[1406]: 2025-05-10 00:46:45.853 [INFO][2822] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.124.128/26 host="10.200.8.32" May 10 00:46:45.919847 env[1406]: 2025-05-10 00:46:45.853 [INFO][2822] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.124.128/26 handle="k8s-pod-network.593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733" host="10.200.8.32" May 10 00:46:45.919847 env[1406]: 2025-05-10 00:46:45.854 [INFO][2822] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733 May 10 00:46:45.919847 env[1406]: 2025-05-10 00:46:45.858 [INFO][2822] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.124.128/26 handle="k8s-pod-network.593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733" host="10.200.8.32" May 10 00:46:45.919847 env[1406]: 2025-05-10 00:46:45.866 [INFO][2822] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.124.129/26] block=192.168.124.128/26 handle="k8s-pod-network.593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733" host="10.200.8.32" May 10 00:46:45.919847 env[1406]: 2025-05-10 00:46:45.867 [INFO][2822] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.124.129/26] handle="k8s-pod-network.593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733" host="10.200.8.32" May 10 00:46:45.919847 env[1406]: 2025-05-10 00:46:45.867 [INFO][2822] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:45.919847 env[1406]: 2025-05-10 00:46:45.867 [INFO][2822] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.124.129/26] IPv6=[] ContainerID="593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733" HandleID="k8s-pod-network.593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733" Workload="10.200.8.32-k8s-csi--node--driver--lxt8k-eth0" May 10 00:46:45.920814 env[1406]: 2025-05-10 00:46:45.869 [INFO][2809] cni-plugin/k8s.go 386: Populated endpoint ContainerID="593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733" Namespace="calico-system" Pod="csi-node-driver-lxt8k" WorkloadEndpoint="10.200.8.32-k8s-csi--node--driver--lxt8k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.32-k8s-csi--node--driver--lxt8k-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"89799d19-090a-4418-ac5e-412518f2dcdb", ResourceVersion:"1200", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.32", ContainerID:"", Pod:"csi-node-driver-lxt8k", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.124.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali913a28ebd19", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:45.920814 env[1406]: 2025-05-10 00:46:45.869 [INFO][2809] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.124.129/32] ContainerID="593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733" Namespace="calico-system" Pod="csi-node-driver-lxt8k" WorkloadEndpoint="10.200.8.32-k8s-csi--node--driver--lxt8k-eth0" May 10 00:46:45.920814 env[1406]: 2025-05-10 00:46:45.869 [INFO][2809] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali913a28ebd19 ContainerID="593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733" Namespace="calico-system" Pod="csi-node-driver-lxt8k" WorkloadEndpoint="10.200.8.32-k8s-csi--node--driver--lxt8k-eth0" May 10 00:46:45.920814 env[1406]: 2025-05-10 00:46:45.902 [INFO][2809] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733" Namespace="calico-system" Pod="csi-node-driver-lxt8k" WorkloadEndpoint="10.200.8.32-k8s-csi--node--driver--lxt8k-eth0" May 10 00:46:45.920814 env[1406]: 2025-05-10 00:46:45.903 [INFO][2809] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733" Namespace="calico-system" Pod="csi-node-driver-lxt8k" WorkloadEndpoint="10.200.8.32-k8s-csi--node--driver--lxt8k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.32-k8s-csi--node--driver--lxt8k-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"89799d19-090a-4418-ac5e-412518f2dcdb", ResourceVersion:"1200", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.32", ContainerID:"593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733", Pod:"csi-node-driver-lxt8k", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.124.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali913a28ebd19", MAC:"e6:be:e6:9b:4f:f4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:45.920814 env[1406]: 2025-05-10 00:46:45.916 [INFO][2809] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733" Namespace="calico-system" Pod="csi-node-driver-lxt8k" WorkloadEndpoint="10.200.8.32-k8s-csi--node--driver--lxt8k-eth0" May 10 00:46:45.932000 audit[2842]: NETFILTER_CFG table=filter:76 family=2 entries=34 op=nft_register_chain pid=2842 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:45.932000 audit[2842]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff311d6170 a2=0 a3=7fff311d615c items=0 ppid=2611 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:45.932000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:45.942063 env[1406]: time="2025-05-10T00:46:45.941999739Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:46:45.942063 env[1406]: time="2025-05-10T00:46:45.942034739Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:46:45.942258 env[1406]: time="2025-05-10T00:46:45.942047939Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:46:45.942483 env[1406]: time="2025-05-10T00:46:45.942441741Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733 pid=2851 runtime=io.containerd.runc.v2 May 10 00:46:45.970996 systemd[1]: Started cri-containerd-593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733.scope. May 10 00:46:45.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.985000 audit: BPF prog-id=98 op=LOAD May 10 00:46:45.986000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2851 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:45.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539336433386463306164313936336239336466333239303938636239 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2851 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:45.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539336433386463306164313936336239336466333239303938636239 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit: BPF prog-id=99 op=LOAD May 10 00:46:45.986000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001d5830 items=0 ppid=2851 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:45.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539336433386463306164313936336239336466333239303938636239 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit: BPF prog-id=100 op=LOAD May 10 00:46:45.986000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001d5878 items=0 ppid=2851 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:45.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539336433386463306164313936336239336466333239303938636239 May 10 00:46:45.986000 audit: BPF prog-id=100 op=UNLOAD May 10 00:46:45.986000 audit: BPF prog-id=99 op=UNLOAD May 10 00:46:45.986000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:45.986000 audit: BPF prog-id=101 op=LOAD May 10 00:46:45.986000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001d5c88 items=0 ppid=2851 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:45.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539336433386463306164313936336239336466333239303938636239 May 10 00:46:46.002982 env[1406]: time="2025-05-10T00:46:46.002937101Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-lxt8k,Uid:89799d19-090a-4418-ac5e-412518f2dcdb,Namespace:calico-system,Attempt:1,} returns sandbox id \"593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733\"" May 10 00:46:46.004645 env[1406]: time="2025-05-10T00:46:46.004614608Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 10 00:46:46.539793 kubelet[1954]: E0510 00:46:46.539752 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:46.716295 systemd[1]: run-containerd-runc-k8s.io-593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733-runc.Yww7xh.mount: Deactivated successfully. May 10 00:46:47.279079 systemd-networkd[1554]: cali913a28ebd19: Gained IPv6LL May 10 00:46:47.288847 env[1406]: time="2025-05-10T00:46:47.288795062Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:47.297688 env[1406]: time="2025-05-10T00:46:47.297643398Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:47.302456 env[1406]: time="2025-05-10T00:46:47.302414018Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:47.307806 env[1406]: time="2025-05-10T00:46:47.307769640Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:47.308218 env[1406]: time="2025-05-10T00:46:47.308182941Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 10 00:46:47.310651 env[1406]: time="2025-05-10T00:46:47.310612051Z" level=info msg="CreateContainer within sandbox \"593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 10 00:46:47.358968 env[1406]: time="2025-05-10T00:46:47.358913149Z" level=info msg="CreateContainer within sandbox \"593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"a848bd09b7806622f73a8378c578f11a6de87676c2286716177f6b3c3bb87a43\"" May 10 00:46:47.359734 env[1406]: time="2025-05-10T00:46:47.359693852Z" level=info msg="StartContainer for \"a848bd09b7806622f73a8378c578f11a6de87676c2286716177f6b3c3bb87a43\"" May 10 00:46:47.397050 systemd[1]: run-containerd-runc-k8s.io-a848bd09b7806622f73a8378c578f11a6de87676c2286716177f6b3c3bb87a43-runc.Qqlg5b.mount: Deactivated successfully. May 10 00:46:47.400579 systemd[1]: Started cri-containerd-a848bd09b7806622f73a8378c578f11a6de87676c2286716177f6b3c3bb87a43.scope. May 10 00:46:47.438178 kernel: kauditd_printk_skb: 614 callbacks suppressed May 10 00:46:47.438372 kernel: audit: type=1400 audit(1746838007.417:628): avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.417000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.460271 kernel: audit: type=1300 audit(1746838007.417:628): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fd3c8233078 items=0 ppid=2851 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:47.417000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fd3c8233078 items=0 ppid=2851 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:47.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138343862643039623738303636323266373361383337386335373866 May 10 00:46:47.480996 kernel: audit: type=1327 audit(1746838007.417:628): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138343862643039623738303636323266373361383337386335373866 May 10 00:46:47.417000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.500021 kernel: audit: type=1400 audit(1746838007.417:629): avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.417000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.516939 kernel: audit: type=1400 audit(1746838007.417:629): avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.417000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.536204 kernel: audit: type=1400 audit(1746838007.417:629): avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.417000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.550670 kubelet[1954]: E0510 00:46:47.550439 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:47.551065 kernel: audit: type=1400 audit(1746838007.417:629): avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.417000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.417000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.580374 kernel: audit: type=1400 audit(1746838007.417:629): avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.582108 kernel: audit: type=1400 audit(1746838007.417:629): avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.582161 kernel: audit: type=1400 audit(1746838007.417:629): avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.417000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.588195 env[1406]: time="2025-05-10T00:46:47.588152385Z" level=info msg="StartContainer for \"a848bd09b7806622f73a8378c578f11a6de87676c2286716177f6b3c3bb87a43\" returns successfully" May 10 00:46:47.589619 env[1406]: time="2025-05-10T00:46:47.589594991Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 10 00:46:47.417000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.417000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.417000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.417000 audit: BPF prog-id=102 op=LOAD May 10 00:46:47.417000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002d1f98 items=0 ppid=2851 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:47.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138343862643039623738303636323266373361383337386335373866 May 10 00:46:47.438000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.438000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.438000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.438000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.438000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.438000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.438000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.438000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.438000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.438000 audit: BPF prog-id=103 op=LOAD May 10 00:46:47.438000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002d1fe8 items=0 ppid=2851 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:47.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138343862643039623738303636323266373361383337386335373866 May 10 00:46:47.480000 audit: BPF prog-id=103 op=UNLOAD May 10 00:46:47.480000 audit: BPF prog-id=102 op=UNLOAD May 10 00:46:47.480000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.480000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.480000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.480000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.480000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.480000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.480000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.480000 audit[2890]: AVC avc: denied { perfmon } for pid=2890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.480000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.480000 audit[2890]: AVC avc: denied { bpf } for pid=2890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.480000 audit: BPF prog-id=104 op=LOAD May 10 00:46:47.480000 audit[2890]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003a2078 items=0 ppid=2851 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:47.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138343862643039623738303636323266373361383337386335373866 May 10 00:46:47.612191 env[1406]: time="2025-05-10T00:46:47.612150583Z" level=info msg="StopPodSandbox for \"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162\"" May 10 00:46:47.685288 env[1406]: 2025-05-10 00:46:47.652 [INFO][2929] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" May 10 00:46:47.685288 env[1406]: 2025-05-10 00:46:47.652 [INFO][2929] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" iface="eth0" netns="/var/run/netns/cni-ff64d17c-c453-53f4-e0ad-025905ae753d" May 10 00:46:47.685288 env[1406]: 2025-05-10 00:46:47.652 [INFO][2929] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" iface="eth0" netns="/var/run/netns/cni-ff64d17c-c453-53f4-e0ad-025905ae753d" May 10 00:46:47.685288 env[1406]: 2025-05-10 00:46:47.652 [INFO][2929] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" iface="eth0" netns="/var/run/netns/cni-ff64d17c-c453-53f4-e0ad-025905ae753d" May 10 00:46:47.685288 env[1406]: 2025-05-10 00:46:47.652 [INFO][2929] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" May 10 00:46:47.685288 env[1406]: 2025-05-10 00:46:47.652 [INFO][2929] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" May 10 00:46:47.685288 env[1406]: 2025-05-10 00:46:47.673 [INFO][2936] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" HandleID="k8s-pod-network.8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" Workload="10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0" May 10 00:46:47.685288 env[1406]: 2025-05-10 00:46:47.673 [INFO][2936] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:47.685288 env[1406]: 2025-05-10 00:46:47.673 [INFO][2936] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:47.685288 env[1406]: 2025-05-10 00:46:47.681 [WARNING][2936] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" HandleID="k8s-pod-network.8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" Workload="10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0" May 10 00:46:47.685288 env[1406]: 2025-05-10 00:46:47.681 [INFO][2936] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" HandleID="k8s-pod-network.8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" Workload="10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0" May 10 00:46:47.685288 env[1406]: 2025-05-10 00:46:47.683 [INFO][2936] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:47.685288 env[1406]: 2025-05-10 00:46:47.684 [INFO][2929] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" May 10 00:46:47.686060 env[1406]: time="2025-05-10T00:46:47.685465083Z" level=info msg="TearDown network for sandbox \"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162\" successfully" May 10 00:46:47.686060 env[1406]: time="2025-05-10T00:46:47.685500283Z" level=info msg="StopPodSandbox for \"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162\" returns successfully" May 10 00:46:47.686179 env[1406]: time="2025-05-10T00:46:47.686145086Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-sccv4,Uid:80c87108-bd28-459d-8a12-55aed7e7bc08,Namespace:default,Attempt:1,}" May 10 00:46:47.717151 systemd[1]: run-netns-cni\x2dff64d17c\x2dc453\x2d53f4\x2de0ad\x2d025905ae753d.mount: Deactivated successfully. May 10 00:46:47.876899 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:46:47.873967 systemd-networkd[1554]: califb01437a27e: Link UP May 10 00:46:47.886152 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califb01437a27e: link becomes ready May 10 00:46:47.885960 systemd-networkd[1554]: califb01437a27e: Gained carrier May 10 00:46:47.898575 env[1406]: 2025-05-10 00:46:47.788 [INFO][2943] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0 nginx-deployment-85f456d6dd- default 80c87108-bd28-459d-8a12-55aed7e7bc08 1213 0 2025-05-10 00:46:34 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.32 nginx-deployment-85f456d6dd-sccv4 eth0 default [] [] [kns.default ksa.default.default] califb01437a27e [] []}} ContainerID="84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a" Namespace="default" Pod="nginx-deployment-85f456d6dd-sccv4" WorkloadEndpoint="10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-" May 10 00:46:47.898575 env[1406]: 2025-05-10 00:46:47.789 [INFO][2943] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a" Namespace="default" Pod="nginx-deployment-85f456d6dd-sccv4" WorkloadEndpoint="10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0" May 10 00:46:47.898575 env[1406]: 2025-05-10 00:46:47.819 [INFO][2955] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a" HandleID="k8s-pod-network.84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a" Workload="10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0" May 10 00:46:47.898575 env[1406]: 2025-05-10 00:46:47.830 [INFO][2955] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a" HandleID="k8s-pod-network.84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a" Workload="10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031ba60), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.32", "pod":"nginx-deployment-85f456d6dd-sccv4", "timestamp":"2025-05-10 00:46:47.819191029 +0000 UTC"}, Hostname:"10.200.8.32", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:46:47.898575 env[1406]: 2025-05-10 00:46:47.830 [INFO][2955] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:47.898575 env[1406]: 2025-05-10 00:46:47.830 [INFO][2955] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:47.898575 env[1406]: 2025-05-10 00:46:47.830 [INFO][2955] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.32' May 10 00:46:47.898575 env[1406]: 2025-05-10 00:46:47.832 [INFO][2955] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a" host="10.200.8.32" May 10 00:46:47.898575 env[1406]: 2025-05-10 00:46:47.835 [INFO][2955] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.32" May 10 00:46:47.898575 env[1406]: 2025-05-10 00:46:47.840 [INFO][2955] ipam/ipam.go 489: Trying affinity for 192.168.124.128/26 host="10.200.8.32" May 10 00:46:47.898575 env[1406]: 2025-05-10 00:46:47.842 [INFO][2955] ipam/ipam.go 155: Attempting to load block cidr=192.168.124.128/26 host="10.200.8.32" May 10 00:46:47.898575 env[1406]: 2025-05-10 00:46:47.844 [INFO][2955] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.124.128/26 host="10.200.8.32" May 10 00:46:47.898575 env[1406]: 2025-05-10 00:46:47.844 [INFO][2955] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.124.128/26 handle="k8s-pod-network.84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a" host="10.200.8.32" May 10 00:46:47.898575 env[1406]: 2025-05-10 00:46:47.845 [INFO][2955] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a May 10 00:46:47.898575 env[1406]: 2025-05-10 00:46:47.853 [INFO][2955] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.124.128/26 handle="k8s-pod-network.84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a" host="10.200.8.32" May 10 00:46:47.898575 env[1406]: 2025-05-10 00:46:47.858 [INFO][2955] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.124.130/26] block=192.168.124.128/26 handle="k8s-pod-network.84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a" host="10.200.8.32" May 10 00:46:47.898575 env[1406]: 2025-05-10 00:46:47.863 [INFO][2955] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.124.130/26] handle="k8s-pod-network.84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a" host="10.200.8.32" May 10 00:46:47.898575 env[1406]: 2025-05-10 00:46:47.863 [INFO][2955] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:47.898575 env[1406]: 2025-05-10 00:46:47.863 [INFO][2955] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.124.130/26] IPv6=[] ContainerID="84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a" HandleID="k8s-pod-network.84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a" Workload="10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0" May 10 00:46:47.901244 env[1406]: 2025-05-10 00:46:47.865 [INFO][2943] cni-plugin/k8s.go 386: Populated endpoint ContainerID="84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a" Namespace="default" Pod="nginx-deployment-85f456d6dd-sccv4" WorkloadEndpoint="10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"80c87108-bd28-459d-8a12-55aed7e7bc08", ResourceVersion:"1213", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.32", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-sccv4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.124.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"califb01437a27e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:47.901244 env[1406]: 2025-05-10 00:46:47.865 [INFO][2943] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.124.130/32] ContainerID="84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a" Namespace="default" Pod="nginx-deployment-85f456d6dd-sccv4" WorkloadEndpoint="10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0" May 10 00:46:47.901244 env[1406]: 2025-05-10 00:46:47.865 [INFO][2943] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to califb01437a27e ContainerID="84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a" Namespace="default" Pod="nginx-deployment-85f456d6dd-sccv4" WorkloadEndpoint="10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0" May 10 00:46:47.901244 env[1406]: 2025-05-10 00:46:47.887 [INFO][2943] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a" Namespace="default" Pod="nginx-deployment-85f456d6dd-sccv4" WorkloadEndpoint="10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0" May 10 00:46:47.901244 env[1406]: 2025-05-10 00:46:47.887 [INFO][2943] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a" Namespace="default" Pod="nginx-deployment-85f456d6dd-sccv4" WorkloadEndpoint="10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"80c87108-bd28-459d-8a12-55aed7e7bc08", ResourceVersion:"1213", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.32", ContainerID:"84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a", Pod:"nginx-deployment-85f456d6dd-sccv4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.124.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"califb01437a27e", MAC:"6a:7b:f4:4a:54:09", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:47.901244 env[1406]: 2025-05-10 00:46:47.897 [INFO][2943] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a" Namespace="default" Pod="nginx-deployment-85f456d6dd-sccv4" WorkloadEndpoint="10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0" May 10 00:46:47.910000 audit[2975]: NETFILTER_CFG table=filter:77 family=2 entries=38 op=nft_register_chain pid=2975 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:47.910000 audit[2975]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7fff0523ce30 a2=0 a3=7fff0523ce1c items=0 ppid=2611 pid=2975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:47.910000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:47.922383 env[1406]: time="2025-05-10T00:46:47.922310750Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:46:47.922383 env[1406]: time="2025-05-10T00:46:47.922347751Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:46:47.922626 env[1406]: time="2025-05-10T00:46:47.922585352Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:46:47.922922 env[1406]: time="2025-05-10T00:46:47.922815853Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a pid=2984 runtime=io.containerd.runc.v2 May 10 00:46:47.943936 systemd[1]: Started cri-containerd-84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a.scope. May 10 00:46:47.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.953000 audit: BPF prog-id=105 op=LOAD May 10 00:46:47.953000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.953000 audit[2995]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2984 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:47.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834623632343831663137323032383139303461336338646631353464 May 10 00:46:47.953000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.953000 audit[2995]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2984 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:47.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834623632343831663137323032383139303461336338646631353464 May 10 00:46:47.953000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.953000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.953000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.953000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.953000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.953000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.953000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.953000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.953000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.953000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.953000 audit: BPF prog-id=106 op=LOAD May 10 00:46:47.953000 audit[2995]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dbde0 items=0 ppid=2984 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:47.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834623632343831663137323032383139303461336338646631353464 May 10 00:46:47.954000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.954000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.954000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.954000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.954000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.954000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.954000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.954000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.954000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.954000 audit: BPF prog-id=107 op=LOAD May 10 00:46:47.954000 audit[2995]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001dbe28 items=0 ppid=2984 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:47.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834623632343831663137323032383139303461336338646631353464 May 10 00:46:47.954000 audit: BPF prog-id=107 op=UNLOAD May 10 00:46:47.954000 audit: BPF prog-id=106 op=UNLOAD May 10 00:46:47.954000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.954000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.954000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.954000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.954000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.954000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.954000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.954000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.954000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.954000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:47.954000 audit: BPF prog-id=108 op=LOAD May 10 00:46:47.954000 audit[2995]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c2238 items=0 ppid=2984 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:47.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834623632343831663137323032383139303461336338646631353464 May 10 00:46:47.982725 env[1406]: time="2025-05-10T00:46:47.982677897Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-sccv4,Uid:80c87108-bd28-459d-8a12-55aed7e7bc08,Namespace:default,Attempt:1,} returns sandbox id \"84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a\"" May 10 00:46:48.551330 kubelet[1954]: E0510 00:46:48.551258 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:49.089047 env[1406]: time="2025-05-10T00:46:49.088986095Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:49.097133 env[1406]: time="2025-05-10T00:46:49.097067327Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:49.101907 env[1406]: time="2025-05-10T00:46:49.101842045Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:49.108143 env[1406]: time="2025-05-10T00:46:49.108095969Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:49.108817 env[1406]: time="2025-05-10T00:46:49.108777572Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 10 00:46:49.111702 env[1406]: time="2025-05-10T00:46:49.111013381Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 10 00:46:49.112346 env[1406]: time="2025-05-10T00:46:49.112269186Z" level=info msg="CreateContainer within sandbox \"593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 10 00:46:49.150091 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3470970223.mount: Deactivated successfully. May 10 00:46:49.169104 env[1406]: time="2025-05-10T00:46:49.169052306Z" level=info msg="CreateContainer within sandbox \"593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"adf22c9fe543a6adc6cdd1d72c55959b8d3c233d3c15ef62bdf41e8c4096c279\"" May 10 00:46:49.169994 env[1406]: time="2025-05-10T00:46:49.169952710Z" level=info msg="StartContainer for \"adf22c9fe543a6adc6cdd1d72c55959b8d3c233d3c15ef62bdf41e8c4096c279\"" May 10 00:46:49.206904 systemd[1]: run-containerd-runc-k8s.io-adf22c9fe543a6adc6cdd1d72c55959b8d3c233d3c15ef62bdf41e8c4096c279-runc.GHuxOH.mount: Deactivated successfully. May 10 00:46:49.211931 systemd[1]: Started cri-containerd-adf22c9fe543a6adc6cdd1d72c55959b8d3c233d3c15ef62bdf41e8c4096c279.scope. May 10 00:46:49.225000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.225000 audit[3034]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7fee2d4eacc8 items=0 ppid=2851 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:49.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164663232633966653534336136616463366364643164373263353539 May 10 00:46:49.225000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.225000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.225000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.225000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.225000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.225000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.225000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.225000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.225000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.225000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.225000 audit: BPF prog-id=109 op=LOAD May 10 00:46:49.225000 audit[3034]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c0002852f8 items=0 ppid=2851 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:49.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164663232633966653534336136616463366364643164373263353539 May 10 00:46:49.225000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.225000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.225000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.225000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.225000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.225000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.225000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.225000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.225000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.225000 audit: BPF prog-id=110 op=LOAD May 10 00:46:49.225000 audit[3034]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c000285348 items=0 ppid=2851 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:49.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164663232633966653534336136616463366364643164373263353539 May 10 00:46:49.225000 audit: BPF prog-id=110 op=UNLOAD May 10 00:46:49.226000 audit: BPF prog-id=109 op=UNLOAD May 10 00:46:49.226000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.226000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.226000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.226000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.226000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.226000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.226000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.226000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.226000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.226000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:49.226000 audit: BPF prog-id=111 op=LOAD May 10 00:46:49.226000 audit[3034]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0002853d8 items=0 ppid=2851 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:49.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164663232633966653534336136616463366364643164373263353539 May 10 00:46:49.242512 env[1406]: time="2025-05-10T00:46:49.242439291Z" level=info msg="StartContainer for \"adf22c9fe543a6adc6cdd1d72c55959b8d3c233d3c15ef62bdf41e8c4096c279\" returns successfully" May 10 00:46:49.551458 kubelet[1954]: E0510 00:46:49.551408 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:49.628634 kubelet[1954]: I0510 00:46:49.628599 1954 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 10 00:46:49.628634 kubelet[1954]: I0510 00:46:49.628640 1954 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 10 00:46:49.699236 kubelet[1954]: I0510 00:46:49.699176 1954 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-lxt8k" podStartSLOduration=27.593623194 podStartE2EDuration="30.699160963s" podCreationTimestamp="2025-05-10 00:46:19 +0000 UTC" firstStartedPulling="2025-05-10 00:46:46.004351407 +0000 UTC m=+27.170513291" lastFinishedPulling="2025-05-10 00:46:49.109889276 +0000 UTC m=+30.276051060" observedRunningTime="2025-05-10 00:46:49.699067163 +0000 UTC m=+30.865229047" watchObservedRunningTime="2025-05-10 00:46:49.699160963 +0000 UTC m=+30.865322747" May 10 00:46:49.711041 systemd-networkd[1554]: califb01437a27e: Gained IPv6LL May 10 00:46:50.552012 kubelet[1954]: E0510 00:46:50.551961 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:51.552367 kubelet[1954]: E0510 00:46:51.552291 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:51.964821 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2597264041.mount: Deactivated successfully. May 10 00:46:52.552943 kubelet[1954]: E0510 00:46:52.552864 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:53.523794 env[1406]: time="2025-05-10T00:46:53.523747240Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:53.532565 env[1406]: time="2025-05-10T00:46:53.532517770Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:53.538193 env[1406]: time="2025-05-10T00:46:53.538158090Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:53.542969 env[1406]: time="2025-05-10T00:46:53.542936207Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:46:53.544108 env[1406]: time="2025-05-10T00:46:53.544073511Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 10 00:46:53.547260 env[1406]: time="2025-05-10T00:46:53.547228022Z" level=info msg="CreateContainer within sandbox \"84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 10 00:46:53.553231 kubelet[1954]: E0510 00:46:53.553203 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:53.582954 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2114740309.mount: Deactivated successfully. May 10 00:46:53.591723 env[1406]: time="2025-05-10T00:46:53.591673578Z" level=info msg="CreateContainer within sandbox \"84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"cdf2f04d725739e4047f630ab543f1dff696b7ad70b39320dc579afe94c1fe76\"" May 10 00:46:53.592370 env[1406]: time="2025-05-10T00:46:53.592291680Z" level=info msg="StartContainer for \"cdf2f04d725739e4047f630ab543f1dff696b7ad70b39320dc579afe94c1fe76\"" May 10 00:46:53.623762 systemd[1]: Started cri-containerd-cdf2f04d725739e4047f630ab543f1dff696b7ad70b39320dc579afe94c1fe76.scope. May 10 00:46:53.668740 kernel: kauditd_printk_skb: 136 callbacks suppressed May 10 00:46:53.668913 kernel: audit: type=1400 audit(1746838013.643:659): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.698286 kernel: audit: type=1400 audit(1746838013.643:660): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.698404 kernel: audit: type=1400 audit(1746838013.643:661): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.698961 kernel: audit: type=1400 audit(1746838013.643:662): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.723723 kernel: audit: type=1400 audit(1746838013.643:663): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.723805 kernel: audit: type=1400 audit(1746838013.643:664): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.735573 kernel: audit: type=1400 audit(1746838013.643:665): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.747744 kernel: audit: type=1400 audit(1746838013.643:666): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.777921 kernel: audit: type=1400 audit(1746838013.643:667): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.777962 kernel: audit: type=1400 audit(1746838013.667:668): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.780174 env[1406]: time="2025-05-10T00:46:53.780139739Z" level=info msg="StartContainer for \"cdf2f04d725739e4047f630ab543f1dff696b7ad70b39320dc579afe94c1fe76\" returns successfully" May 10 00:46:53.667000 audit: BPF prog-id=112 op=LOAD May 10 00:46:53.668000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.668000 audit[3079]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2984 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:53.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364663266303464373235373339653430343766363330616235343366 May 10 00:46:53.668000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.668000 audit[3079]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2984 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:53.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364663266303464373235373339653430343766363330616235343366 May 10 00:46:53.668000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.668000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.668000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.668000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.668000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.668000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.668000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.668000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.668000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.668000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.668000 audit: BPF prog-id=113 op=LOAD May 10 00:46:53.668000 audit[3079]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003231e0 items=0 ppid=2984 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:53.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364663266303464373235373339653430343766363330616235343366 May 10 00:46:53.682000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.682000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.682000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.682000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.682000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.682000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.682000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.682000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.682000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.682000 audit: BPF prog-id=114 op=LOAD May 10 00:46:53.682000 audit[3079]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000323228 items=0 ppid=2984 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:53.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364663266303464373235373339653430343766363330616235343366 May 10 00:46:53.682000 audit: BPF prog-id=114 op=UNLOAD May 10 00:46:53.683000 audit: BPF prog-id=113 op=UNLOAD May 10 00:46:53.683000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.683000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.683000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.683000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.683000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.683000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.683000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.683000 audit[3079]: AVC avc: denied { perfmon } for pid=3079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.683000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.683000 audit[3079]: AVC avc: denied { bpf } for pid=3079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:53.683000 audit: BPF prog-id=115 op=LOAD May 10 00:46:53.683000 audit[3079]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000323638 items=0 ppid=2984 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:53.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364663266303464373235373339653430343766363330616235343366 May 10 00:46:54.554305 kubelet[1954]: E0510 00:46:54.554213 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:54.572856 systemd[1]: run-containerd-runc-k8s.io-cdf2f04d725739e4047f630ab543f1dff696b7ad70b39320dc579afe94c1fe76-runc.IEgZwq.mount: Deactivated successfully. May 10 00:46:55.555355 kubelet[1954]: E0510 00:46:55.555296 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:56.556096 kubelet[1954]: E0510 00:46:56.556046 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:57.556898 kubelet[1954]: E0510 00:46:57.556847 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:58.557410 kubelet[1954]: E0510 00:46:58.557354 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:59.509812 kubelet[1954]: E0510 00:46:59.509768 1954 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:59.514000 audit[3132]: NETFILTER_CFG table=filter:78 family=2 entries=20 op=nft_register_rule pid=3132 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:59.519938 kernel: kauditd_printk_skb: 47 callbacks suppressed May 10 00:46:59.521686 kernel: audit: type=1325 audit(1746838019.514:677): table=filter:78 family=2 entries=20 op=nft_register_rule pid=3132 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:59.514000 audit[3132]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe89190570 a2=0 a3=7ffe8919055c items=0 ppid=2174 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:59.555823 kernel: audit: type=1300 audit(1746838019.514:677): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe89190570 a2=0 a3=7ffe8919055c items=0 ppid=2174 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:59.555946 kernel: audit: type=1327 audit(1746838019.514:677): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:59.514000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:59.556524 kubelet[1954]: I0510 00:46:59.556465 1954 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-sccv4" podStartSLOduration=19.995227796 podStartE2EDuration="25.556444508s" podCreationTimestamp="2025-05-10 00:46:34 +0000 UTC" firstStartedPulling="2025-05-10 00:46:47.984303604 +0000 UTC m=+29.150465388" lastFinishedPulling="2025-05-10 00:46:53.545520316 +0000 UTC m=+34.711682100" observedRunningTime="2025-05-10 00:46:54.743678357 +0000 UTC m=+35.909840241" watchObservedRunningTime="2025-05-10 00:46:59.556444508 +0000 UTC m=+40.722606292" May 10 00:46:59.556964 kubelet[1954]: I0510 00:46:59.556938 1954 topology_manager.go:215] "Topology Admit Handler" podUID="8e3b9beb-3ddc-4b6e-8aaa-e4867a64b356" podNamespace="default" podName="nfs-server-provisioner-0" May 10 00:46:59.557477 kubelet[1954]: E0510 00:46:59.557460 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:46:59.562952 systemd[1]: Created slice kubepods-besteffort-pod8e3b9beb_3ddc_4b6e_8aaa_e4867a64b356.slice. May 10 00:46:59.554000 audit[3132]: NETFILTER_CFG table=nat:79 family=2 entries=22 op=nft_register_rule pid=3132 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:59.582525 kernel: audit: type=1325 audit(1746838019.554:678): table=nat:79 family=2 entries=22 op=nft_register_rule pid=3132 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:59.641314 kernel: audit: type=1300 audit(1746838019.554:678): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe89190570 a2=0 a3=0 items=0 ppid=2174 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:59.554000 audit[3132]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe89190570 a2=0 a3=0 items=0 ppid=2174 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:59.554000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:59.655910 kernel: audit: type=1327 audit(1746838019.554:678): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:59.642000 audit[3136]: NETFILTER_CFG table=filter:80 family=2 entries=32 op=nft_register_rule pid=3136 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:59.668943 kubelet[1954]: I0510 00:46:59.667968 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pxgwl\" (UniqueName: \"kubernetes.io/projected/8e3b9beb-3ddc-4b6e-8aaa-e4867a64b356-kube-api-access-pxgwl\") pod \"nfs-server-provisioner-0\" (UID: \"8e3b9beb-3ddc-4b6e-8aaa-e4867a64b356\") " pod="default/nfs-server-provisioner-0" May 10 00:46:59.668943 kubelet[1954]: I0510 00:46:59.668009 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/8e3b9beb-3ddc-4b6e-8aaa-e4867a64b356-data\") pod \"nfs-server-provisioner-0\" (UID: \"8e3b9beb-3ddc-4b6e-8aaa-e4867a64b356\") " pod="default/nfs-server-provisioner-0" May 10 00:46:59.642000 audit[3136]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe7ad328f0 a2=0 a3=7ffe7ad328dc items=0 ppid=2174 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:59.691949 kernel: audit: type=1325 audit(1746838019.642:679): table=filter:80 family=2 entries=32 op=nft_register_rule pid=3136 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:59.692539 kernel: audit: type=1300 audit(1746838019.642:679): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe7ad328f0 a2=0 a3=7ffe7ad328dc items=0 ppid=2174 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:59.642000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:59.656000 audit[3136]: NETFILTER_CFG table=nat:81 family=2 entries=22 op=nft_register_rule pid=3136 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:59.733788 kernel: audit: type=1327 audit(1746838019.642:679): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:59.733946 kernel: audit: type=1325 audit(1746838019.656:680): table=nat:81 family=2 entries=22 op=nft_register_rule pid=3136 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:59.656000 audit[3136]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe7ad328f0 a2=0 a3=0 items=0 ppid=2174 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:59.656000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:59.867033 env[1406]: time="2025-05-10T00:46:59.866869250Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:8e3b9beb-3ddc-4b6e-8aaa-e4867a64b356,Namespace:default,Attempt:0,}" May 10 00:47:00.025450 systemd-networkd[1554]: cali60e51b789ff: Link UP May 10 00:47:00.032748 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:47:00.032863 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 10 00:47:00.033523 systemd-networkd[1554]: cali60e51b789ff: Gained carrier May 10 00:47:00.045327 env[1406]: 2025-05-10 00:46:59.948 [INFO][3139] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.32-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 8e3b9beb-3ddc-4b6e-8aaa-e4867a64b356 1273 0 2025-05-10 00:46:59 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.8.32 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.32-k8s-nfs--server--provisioner--0-" May 10 00:47:00.045327 env[1406]: 2025-05-10 00:46:59.948 [INFO][3139] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.32-k8s-nfs--server--provisioner--0-eth0" May 10 00:47:00.045327 env[1406]: 2025-05-10 00:46:59.982 [INFO][3152] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce" HandleID="k8s-pod-network.acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce" Workload="10.200.8.32-k8s-nfs--server--provisioner--0-eth0" May 10 00:47:00.045327 env[1406]: 2025-05-10 00:46:59.991 [INFO][3152] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce" HandleID="k8s-pod-network.acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce" Workload="10.200.8.32-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000502b0), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.32", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-10 00:46:59.982086299 +0000 UTC"}, Hostname:"10.200.8.32", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:47:00.045327 env[1406]: 2025-05-10 00:46:59.991 [INFO][3152] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:00.045327 env[1406]: 2025-05-10 00:46:59.991 [INFO][3152] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:00.045327 env[1406]: 2025-05-10 00:46:59.991 [INFO][3152] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.32' May 10 00:47:00.045327 env[1406]: 2025-05-10 00:46:59.992 [INFO][3152] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce" host="10.200.8.32" May 10 00:47:00.045327 env[1406]: 2025-05-10 00:46:59.995 [INFO][3152] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.32" May 10 00:47:00.045327 env[1406]: 2025-05-10 00:47:00.001 [INFO][3152] ipam/ipam.go 489: Trying affinity for 192.168.124.128/26 host="10.200.8.32" May 10 00:47:00.045327 env[1406]: 2025-05-10 00:47:00.002 [INFO][3152] ipam/ipam.go 155: Attempting to load block cidr=192.168.124.128/26 host="10.200.8.32" May 10 00:47:00.045327 env[1406]: 2025-05-10 00:47:00.004 [INFO][3152] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.124.128/26 host="10.200.8.32" May 10 00:47:00.045327 env[1406]: 2025-05-10 00:47:00.004 [INFO][3152] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.124.128/26 handle="k8s-pod-network.acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce" host="10.200.8.32" May 10 00:47:00.045327 env[1406]: 2025-05-10 00:47:00.006 [INFO][3152] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce May 10 00:47:00.045327 env[1406]: 2025-05-10 00:47:00.010 [INFO][3152] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.124.128/26 handle="k8s-pod-network.acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce" host="10.200.8.32" May 10 00:47:00.045327 env[1406]: 2025-05-10 00:47:00.017 [INFO][3152] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.124.131/26] block=192.168.124.128/26 handle="k8s-pod-network.acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce" host="10.200.8.32" May 10 00:47:00.045327 env[1406]: 2025-05-10 00:47:00.017 [INFO][3152] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.124.131/26] handle="k8s-pod-network.acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce" host="10.200.8.32" May 10 00:47:00.045327 env[1406]: 2025-05-10 00:47:00.017 [INFO][3152] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:00.045327 env[1406]: 2025-05-10 00:47:00.017 [INFO][3152] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.124.131/26] IPv6=[] ContainerID="acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce" HandleID="k8s-pod-network.acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce" Workload="10.200.8.32-k8s-nfs--server--provisioner--0-eth0" May 10 00:47:00.048973 env[1406]: 2025-05-10 00:47:00.018 [INFO][3139] cni-plugin/k8s.go 386: Populated endpoint ContainerID="acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.32-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.32-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"8e3b9beb-3ddc-4b6e-8aaa-e4867a64b356", ResourceVersion:"1273", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.32", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.124.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:00.048973 env[1406]: 2025-05-10 00:47:00.018 [INFO][3139] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.124.131/32] ContainerID="acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.32-k8s-nfs--server--provisioner--0-eth0" May 10 00:47:00.048973 env[1406]: 2025-05-10 00:47:00.018 [INFO][3139] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.32-k8s-nfs--server--provisioner--0-eth0" May 10 00:47:00.048973 env[1406]: 2025-05-10 00:47:00.033 [INFO][3139] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.32-k8s-nfs--server--provisioner--0-eth0" May 10 00:47:00.049233 env[1406]: 2025-05-10 00:47:00.034 [INFO][3139] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.32-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.32-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"8e3b9beb-3ddc-4b6e-8aaa-e4867a64b356", ResourceVersion:"1273", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.32", ContainerID:"acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.124.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"9e:e6:bc:fe:4f:64", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:00.049233 env[1406]: 2025-05-10 00:47:00.044 [INFO][3139] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.32-k8s-nfs--server--provisioner--0-eth0" May 10 00:47:00.059000 audit[3174]: NETFILTER_CFG table=filter:82 family=2 entries=38 op=nft_register_chain pid=3174 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:47:00.059000 audit[3174]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffe4b717c30 a2=0 a3=7ffe4b717c1c items=0 ppid=2611 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:00.059000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:47:00.066970 env[1406]: time="2025-05-10T00:47:00.066872751Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:47:00.066970 env[1406]: time="2025-05-10T00:47:00.066932051Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:47:00.067185 env[1406]: time="2025-05-10T00:47:00.066957152Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:47:00.067424 env[1406]: time="2025-05-10T00:47:00.067371653Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce pid=3182 runtime=io.containerd.runc.v2 May 10 00:47:00.093891 systemd[1]: Started cri-containerd-acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce.scope. May 10 00:47:00.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.106000 audit: BPF prog-id=116 op=LOAD May 10 00:47:00.106000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.106000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3182 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:00.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163626566303833616439656337303433336539356563633361373537 May 10 00:47:00.106000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.106000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3182 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:00.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163626566303833616439656337303433336539356563633361373537 May 10 00:47:00.106000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.106000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.106000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.106000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.106000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.106000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.106000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.106000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.106000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.106000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.106000 audit: BPF prog-id=117 op=LOAD May 10 00:47:00.106000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000025310 items=0 ppid=3182 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:00.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163626566303833616439656337303433336539356563633361373537 May 10 00:47:00.106000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.106000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.106000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.106000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.106000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.106000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.106000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.106000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.106000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.106000 audit: BPF prog-id=118 op=LOAD May 10 00:47:00.106000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000025358 items=0 ppid=3182 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:00.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163626566303833616439656337303433336539356563633361373537 May 10 00:47:00.106000 audit: BPF prog-id=118 op=UNLOAD May 10 00:47:00.106000 audit: BPF prog-id=117 op=UNLOAD May 10 00:47:00.107000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.107000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.107000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.107000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.107000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.107000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.107000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.107000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.107000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.107000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:00.107000 audit: BPF prog-id=119 op=LOAD May 10 00:47:00.107000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000025768 items=0 ppid=3182 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:00.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163626566303833616439656337303433336539356563633361373537 May 10 00:47:00.137050 env[1406]: time="2025-05-10T00:47:00.135310154Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:8e3b9beb-3ddc-4b6e-8aaa-e4867a64b356,Namespace:default,Attempt:0,} returns sandbox id \"acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce\"" May 10 00:47:00.139372 env[1406]: time="2025-05-10T00:47:00.139301266Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 10 00:47:00.558205 kubelet[1954]: E0510 00:47:00.558148 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:00.780773 systemd[1]: run-containerd-runc-k8s.io-acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce-runc.hDEGQu.mount: Deactivated successfully. May 10 00:47:01.167189 systemd-networkd[1554]: cali60e51b789ff: Gained IPv6LL May 10 00:47:01.558370 kubelet[1954]: E0510 00:47:01.558303 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:02.558558 kubelet[1954]: E0510 00:47:02.558504 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:03.025914 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3769505010.mount: Deactivated successfully. May 10 00:47:03.559278 kubelet[1954]: E0510 00:47:03.559198 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:04.560170 kubelet[1954]: E0510 00:47:04.560102 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:05.216649 systemd[1]: run-containerd-runc-k8s.io-fdde6be3f29cafb2e699c4d92018dd2af569078a7c1c59574e94095d5dfcd87f-runc.UCGsm9.mount: Deactivated successfully. May 10 00:47:05.561065 kubelet[1954]: E0510 00:47:05.561011 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:06.562284 kubelet[1954]: E0510 00:47:06.562227 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:07.563094 kubelet[1954]: E0510 00:47:07.563040 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:08.563452 kubelet[1954]: E0510 00:47:08.563388 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:09.563835 kubelet[1954]: E0510 00:47:09.563770 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:10.228259 env[1406]: time="2025-05-10T00:47:10.228192954Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:10.240622 env[1406]: time="2025-05-10T00:47:10.240571483Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:10.245148 env[1406]: time="2025-05-10T00:47:10.245106893Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:10.249594 env[1406]: time="2025-05-10T00:47:10.249553304Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:10.250390 env[1406]: time="2025-05-10T00:47:10.250350706Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 10 00:47:10.253798 env[1406]: time="2025-05-10T00:47:10.253765214Z" level=info msg="CreateContainer within sandbox \"acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 10 00:47:10.298209 env[1406]: time="2025-05-10T00:47:10.298156219Z" level=info msg="CreateContainer within sandbox \"acbef083ad9ec70433e95ecc3a75781602d2f0570c791c178b37e17786c478ce\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"0e15c56ca14f68f1b374b9c5e2ac5d11bd89958502457161b7f5d0aaa86011cd\"" May 10 00:47:10.298910 env[1406]: time="2025-05-10T00:47:10.298781120Z" level=info msg="StartContainer for \"0e15c56ca14f68f1b374b9c5e2ac5d11bd89958502457161b7f5d0aaa86011cd\"" May 10 00:47:10.332151 systemd[1]: Started cri-containerd-0e15c56ca14f68f1b374b9c5e2ac5d11bd89958502457161b7f5d0aaa86011cd.scope. May 10 00:47:10.366658 kernel: kauditd_printk_skb: 62 callbacks suppressed May 10 00:47:10.366849 kernel: audit: type=1400 audit(1746838030.343:700): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.382020 kernel: audit: type=1400 audit(1746838030.343:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.411774 kernel: audit: type=1400 audit(1746838030.343:702): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.411950 kernel: audit: type=1400 audit(1746838030.343:703): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.427903 kernel: audit: type=1400 audit(1746838030.343:704): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.462436 kernel: audit: type=1400 audit(1746838030.343:705): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.462584 kernel: audit: type=1400 audit(1746838030.343:706): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.479027 kernel: audit: type=1400 audit(1746838030.343:707): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.479172 env[1406]: time="2025-05-10T00:47:10.479098346Z" level=info msg="StartContainer for \"0e15c56ca14f68f1b374b9c5e2ac5d11bd89958502457161b7f5d0aaa86011cd\" returns successfully" May 10 00:47:10.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.494987 kernel: audit: type=1400 audit(1746838030.343:708): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.366000 audit: BPF prog-id=120 op=LOAD May 10 00:47:10.366000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.510938 kernel: audit: type=1400 audit(1746838030.366:709): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.366000 audit[3256]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3182 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:10.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313563353663613134663638663162333734623963356532616335 May 10 00:47:10.366000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.366000 audit[3256]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3182 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:10.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313563353663613134663638663162333734623963356532616335 May 10 00:47:10.366000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.366000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.366000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.366000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.366000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.366000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.366000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.366000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.366000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.366000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.366000 audit: BPF prog-id=121 op=LOAD May 10 00:47:10.366000 audit[3256]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000255b40 items=0 ppid=3182 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:10.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313563353663613134663638663162333734623963356532616335 May 10 00:47:10.380000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.380000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.380000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.380000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.380000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.380000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.380000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.380000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.380000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.380000 audit: BPF prog-id=122 op=LOAD May 10 00:47:10.380000 audit[3256]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000281238 items=0 ppid=3182 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:10.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313563353663613134663638663162333734623963356532616335 May 10 00:47:10.380000 audit: BPF prog-id=122 op=UNLOAD May 10 00:47:10.380000 audit: BPF prog-id=121 op=UNLOAD May 10 00:47:10.380000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.380000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.380000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.380000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.380000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.380000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.380000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.380000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.380000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.380000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:10.380000 audit: BPF prog-id=123 op=LOAD May 10 00:47:10.380000 audit[3256]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000281648 items=0 ppid=3182 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:10.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313563353663613134663638663162333734623963356532616335 May 10 00:47:10.494000 audit[3284]: AVC avc: denied { search } for pid=3284 comm="rpcbind" name="crypto" dev="proc" ino=27261 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c264 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 10 00:47:10.494000 audit[3284]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fdfe58510c0 a2=0 a3=0 items=0 ppid=3267 pid=3284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c264 key=(null) May 10 00:47:10.494000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 10 00:47:10.537000 audit[3289]: AVC avc: denied { search } for pid=3289 comm="dbus-daemon" name="crypto" dev="proc" ino=27261 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c264 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 10 00:47:10.537000 audit[3289]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f24c3df80c0 a2=0 a3=0 items=0 ppid=3267 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c264 key=(null) May 10 00:47:10.537000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 10 00:47:10.539000 audit[3290]: AVC avc: denied { watch } for pid=3290 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538206 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c264 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c78,c264 tclass=dir permissive=0 May 10 00:47:10.539000 audit[3290]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55c06a507380 a2=2c8 a3=7ffdfcea475c items=0 ppid=3267 pid=3290 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c264 key=(null) May 10 00:47:10.539000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 10 00:47:10.545000 audit[3291]: AVC avc: denied { read } for pid=3291 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=25965 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c264 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 10 00:47:10.545000 audit[3291]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f7873034320 a1=80000 a2=d a3=7ffd266e6ec0 items=0 ppid=3267 pid=3291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c264 key=(null) May 10 00:47:10.545000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 10 00:47:10.546000 audit[3291]: AVC avc: denied { search } for pid=3291 comm="ganesha.nfsd" name="crypto" dev="proc" ino=27261 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c264 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 10 00:47:10.546000 audit[3291]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f78725880c0 a2=0 a3=0 items=0 ppid=3267 pid=3291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c264 key=(null) May 10 00:47:10.546000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 10 00:47:10.564709 kubelet[1954]: E0510 00:47:10.564634 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:10.786000 audit[3296]: NETFILTER_CFG table=filter:83 family=2 entries=20 op=nft_register_rule pid=3296 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:10.786000 audit[3296]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdb77286b0 a2=0 a3=7ffdb772869c items=0 ppid=2174 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:10.786000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:10.792000 audit[3296]: NETFILTER_CFG table=nat:84 family=2 entries=106 op=nft_register_chain pid=3296 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:47:10.792000 audit[3296]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdb77286b0 a2=0 a3=7ffdb772869c items=0 ppid=2174 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:10.792000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:47:11.564999 kubelet[1954]: E0510 00:47:11.564942 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:12.565395 kubelet[1954]: E0510 00:47:12.565339 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:13.565667 kubelet[1954]: E0510 00:47:13.565623 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:14.566483 kubelet[1954]: E0510 00:47:14.566442 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:15.566999 kubelet[1954]: E0510 00:47:15.566949 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:16.567662 kubelet[1954]: E0510 00:47:16.567605 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:17.567821 kubelet[1954]: E0510 00:47:17.567766 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:18.567970 kubelet[1954]: E0510 00:47:18.567925 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:19.509339 kubelet[1954]: E0510 00:47:19.509287 1954 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:19.549018 env[1406]: time="2025-05-10T00:47:19.548968178Z" level=info msg="StopPodSandbox for \"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed\"" May 10 00:47:19.568859 kubelet[1954]: E0510 00:47:19.568813 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:19.635852 env[1406]: 2025-05-10 00:47:19.585 [WARNING][3312] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.32-k8s-csi--node--driver--lxt8k-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"89799d19-090a-4418-ac5e-412518f2dcdb", ResourceVersion:"1227", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.32", ContainerID:"593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733", Pod:"csi-node-driver-lxt8k", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.124.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali913a28ebd19", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:19.635852 env[1406]: 2025-05-10 00:47:19.585 [INFO][3312] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" May 10 00:47:19.635852 env[1406]: 2025-05-10 00:47:19.585 [INFO][3312] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" iface="eth0" netns="" May 10 00:47:19.635852 env[1406]: 2025-05-10 00:47:19.585 [INFO][3312] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" May 10 00:47:19.635852 env[1406]: 2025-05-10 00:47:19.585 [INFO][3312] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" May 10 00:47:19.635852 env[1406]: 2025-05-10 00:47:19.618 [INFO][3319] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" HandleID="k8s-pod-network.930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" Workload="10.200.8.32-k8s-csi--node--driver--lxt8k-eth0" May 10 00:47:19.635852 env[1406]: 2025-05-10 00:47:19.620 [INFO][3319] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:19.635852 env[1406]: 2025-05-10 00:47:19.620 [INFO][3319] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:19.635852 env[1406]: 2025-05-10 00:47:19.630 [WARNING][3319] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" HandleID="k8s-pod-network.930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" Workload="10.200.8.32-k8s-csi--node--driver--lxt8k-eth0" May 10 00:47:19.635852 env[1406]: 2025-05-10 00:47:19.630 [INFO][3319] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" HandleID="k8s-pod-network.930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" Workload="10.200.8.32-k8s-csi--node--driver--lxt8k-eth0" May 10 00:47:19.635852 env[1406]: 2025-05-10 00:47:19.633 [INFO][3319] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:19.635852 env[1406]: 2025-05-10 00:47:19.634 [INFO][3312] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" May 10 00:47:19.636516 env[1406]: time="2025-05-10T00:47:19.635902949Z" level=info msg="TearDown network for sandbox \"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed\" successfully" May 10 00:47:19.636516 env[1406]: time="2025-05-10T00:47:19.635955649Z" level=info msg="StopPodSandbox for \"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed\" returns successfully" May 10 00:47:19.636705 env[1406]: time="2025-05-10T00:47:19.636669550Z" level=info msg="RemovePodSandbox for \"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed\"" May 10 00:47:19.636779 env[1406]: time="2025-05-10T00:47:19.636708550Z" level=info msg="Forcibly stopping sandbox \"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed\"" May 10 00:47:19.717747 env[1406]: 2025-05-10 00:47:19.670 [WARNING][3339] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.32-k8s-csi--node--driver--lxt8k-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"89799d19-090a-4418-ac5e-412518f2dcdb", ResourceVersion:"1227", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.32", ContainerID:"593d38dc0ad1963b93df329098cb982a77a71eec1c4f6e944c60371aa7f4e733", Pod:"csi-node-driver-lxt8k", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.124.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali913a28ebd19", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:19.717747 env[1406]: 2025-05-10 00:47:19.671 [INFO][3339] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" May 10 00:47:19.717747 env[1406]: 2025-05-10 00:47:19.671 [INFO][3339] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" iface="eth0" netns="" May 10 00:47:19.717747 env[1406]: 2025-05-10 00:47:19.671 [INFO][3339] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" May 10 00:47:19.717747 env[1406]: 2025-05-10 00:47:19.671 [INFO][3339] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" May 10 00:47:19.717747 env[1406]: 2025-05-10 00:47:19.707 [INFO][3347] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" HandleID="k8s-pod-network.930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" Workload="10.200.8.32-k8s-csi--node--driver--lxt8k-eth0" May 10 00:47:19.717747 env[1406]: 2025-05-10 00:47:19.708 [INFO][3347] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:19.717747 env[1406]: 2025-05-10 00:47:19.708 [INFO][3347] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:19.717747 env[1406]: 2025-05-10 00:47:19.714 [WARNING][3347] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" HandleID="k8s-pod-network.930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" Workload="10.200.8.32-k8s-csi--node--driver--lxt8k-eth0" May 10 00:47:19.717747 env[1406]: 2025-05-10 00:47:19.714 [INFO][3347] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" HandleID="k8s-pod-network.930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" Workload="10.200.8.32-k8s-csi--node--driver--lxt8k-eth0" May 10 00:47:19.717747 env[1406]: 2025-05-10 00:47:19.715 [INFO][3347] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:19.717747 env[1406]: 2025-05-10 00:47:19.716 [INFO][3339] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed" May 10 00:47:19.717747 env[1406]: time="2025-05-10T00:47:19.717713709Z" level=info msg="TearDown network for sandbox \"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed\" successfully" May 10 00:47:19.729898 env[1406]: time="2025-05-10T00:47:19.729845233Z" level=info msg="RemovePodSandbox \"930fe9406e2c4c672e9f6329d4ea57231ad2d13c2782fc1f36035ec9e9bd06ed\" returns successfully" May 10 00:47:19.730584 env[1406]: time="2025-05-10T00:47:19.730542835Z" level=info msg="StopPodSandbox for \"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162\"" May 10 00:47:19.804698 env[1406]: 2025-05-10 00:47:19.769 [WARNING][3365] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"80c87108-bd28-459d-8a12-55aed7e7bc08", ResourceVersion:"1241", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.32", ContainerID:"84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a", Pod:"nginx-deployment-85f456d6dd-sccv4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.124.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"califb01437a27e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:19.804698 env[1406]: 2025-05-10 00:47:19.769 [INFO][3365] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" May 10 00:47:19.804698 env[1406]: 2025-05-10 00:47:19.769 [INFO][3365] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" iface="eth0" netns="" May 10 00:47:19.804698 env[1406]: 2025-05-10 00:47:19.769 [INFO][3365] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" May 10 00:47:19.804698 env[1406]: 2025-05-10 00:47:19.769 [INFO][3365] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" May 10 00:47:19.804698 env[1406]: 2025-05-10 00:47:19.792 [INFO][3372] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" HandleID="k8s-pod-network.8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" Workload="10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0" May 10 00:47:19.804698 env[1406]: 2025-05-10 00:47:19.792 [INFO][3372] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:19.804698 env[1406]: 2025-05-10 00:47:19.792 [INFO][3372] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:19.804698 env[1406]: 2025-05-10 00:47:19.801 [WARNING][3372] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" HandleID="k8s-pod-network.8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" Workload="10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0" May 10 00:47:19.804698 env[1406]: 2025-05-10 00:47:19.801 [INFO][3372] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" HandleID="k8s-pod-network.8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" Workload="10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0" May 10 00:47:19.804698 env[1406]: 2025-05-10 00:47:19.802 [INFO][3372] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:19.804698 env[1406]: 2025-05-10 00:47:19.803 [INFO][3365] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" May 10 00:47:19.805572 env[1406]: time="2025-05-10T00:47:19.805531182Z" level=info msg="TearDown network for sandbox \"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162\" successfully" May 10 00:47:19.805666 env[1406]: time="2025-05-10T00:47:19.805648682Z" level=info msg="StopPodSandbox for \"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162\" returns successfully" May 10 00:47:19.806203 env[1406]: time="2025-05-10T00:47:19.806173183Z" level=info msg="RemovePodSandbox for \"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162\"" May 10 00:47:19.806377 env[1406]: time="2025-05-10T00:47:19.806326483Z" level=info msg="Forcibly stopping sandbox \"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162\"" May 10 00:47:19.872150 env[1406]: 2025-05-10 00:47:19.842 [WARNING][3390] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"80c87108-bd28-459d-8a12-55aed7e7bc08", ResourceVersion:"1241", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.32", ContainerID:"84b62481f1720281904a3c8df154dff82d816c0b2a1d7e24c3291ccc1ee3558a", Pod:"nginx-deployment-85f456d6dd-sccv4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.124.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"califb01437a27e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:19.872150 env[1406]: 2025-05-10 00:47:19.842 [INFO][3390] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" May 10 00:47:19.872150 env[1406]: 2025-05-10 00:47:19.842 [INFO][3390] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" iface="eth0" netns="" May 10 00:47:19.872150 env[1406]: 2025-05-10 00:47:19.842 [INFO][3390] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" May 10 00:47:19.872150 env[1406]: 2025-05-10 00:47:19.842 [INFO][3390] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" May 10 00:47:19.872150 env[1406]: 2025-05-10 00:47:19.862 [INFO][3397] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" HandleID="k8s-pod-network.8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" Workload="10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0" May 10 00:47:19.872150 env[1406]: 2025-05-10 00:47:19.862 [INFO][3397] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:19.872150 env[1406]: 2025-05-10 00:47:19.863 [INFO][3397] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:19.872150 env[1406]: 2025-05-10 00:47:19.868 [WARNING][3397] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" HandleID="k8s-pod-network.8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" Workload="10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0" May 10 00:47:19.872150 env[1406]: 2025-05-10 00:47:19.868 [INFO][3397] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" HandleID="k8s-pod-network.8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" Workload="10.200.8.32-k8s-nginx--deployment--85f456d6dd--sccv4-eth0" May 10 00:47:19.872150 env[1406]: 2025-05-10 00:47:19.870 [INFO][3397] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:19.872150 env[1406]: 2025-05-10 00:47:19.871 [INFO][3390] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162" May 10 00:47:19.872830 env[1406]: time="2025-05-10T00:47:19.872184613Z" level=info msg="TearDown network for sandbox \"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162\" successfully" May 10 00:47:19.884780 env[1406]: time="2025-05-10T00:47:19.884728637Z" level=info msg="RemovePodSandbox \"8004d738e9840a3b1d00b297b1df049f2e06588caa66df8be241ca753cf70162\" returns successfully" May 10 00:47:20.569764 kubelet[1954]: E0510 00:47:20.569710 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:21.570856 kubelet[1954]: E0510 00:47:21.570794 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:22.572003 kubelet[1954]: E0510 00:47:22.571953 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:23.572319 kubelet[1954]: E0510 00:47:23.572280 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:24.572491 kubelet[1954]: E0510 00:47:24.572436 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:25.573340 kubelet[1954]: E0510 00:47:25.573278 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:26.573717 kubelet[1954]: E0510 00:47:26.573663 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:27.574283 kubelet[1954]: E0510 00:47:27.574218 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:28.575428 kubelet[1954]: E0510 00:47:28.575373 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:29.576539 kubelet[1954]: E0510 00:47:29.576479 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:30.577338 kubelet[1954]: E0510 00:47:30.577287 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:31.577823 kubelet[1954]: E0510 00:47:31.577774 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:32.580723 kubelet[1954]: E0510 00:47:32.580668 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:33.581177 kubelet[1954]: E0510 00:47:33.581123 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:34.582039 kubelet[1954]: E0510 00:47:34.581984 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:34.992514 kubelet[1954]: I0510 00:47:34.992370 1954 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=25.879338251 podStartE2EDuration="35.992354396s" podCreationTimestamp="2025-05-10 00:46:59 +0000 UTC" firstStartedPulling="2025-05-10 00:47:00.138826764 +0000 UTC m=+41.304988648" lastFinishedPulling="2025-05-10 00:47:10.251843009 +0000 UTC m=+51.418004793" observedRunningTime="2025-05-10 00:47:10.770324034 +0000 UTC m=+51.936485918" watchObservedRunningTime="2025-05-10 00:47:34.992354396 +0000 UTC m=+76.158516180" May 10 00:47:34.992801 kubelet[1954]: I0510 00:47:34.992514 1954 topology_manager.go:215] "Topology Admit Handler" podUID="e07d2efa-6aaa-4deb-9617-75f0869dc574" podNamespace="default" podName="test-pod-1" May 10 00:47:34.998708 systemd[1]: Created slice kubepods-besteffort-pode07d2efa_6aaa_4deb_9617_75f0869dc574.slice. May 10 00:47:35.096051 kubelet[1954]: I0510 00:47:35.096001 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-a807b5c0-d7c0-4b55-8213-4e4533165fb1\" (UniqueName: \"kubernetes.io/nfs/e07d2efa-6aaa-4deb-9617-75f0869dc574-pvc-a807b5c0-d7c0-4b55-8213-4e4533165fb1\") pod \"test-pod-1\" (UID: \"e07d2efa-6aaa-4deb-9617-75f0869dc574\") " pod="default/test-pod-1" May 10 00:47:35.096051 kubelet[1954]: I0510 00:47:35.096057 1954 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vxqbx\" (UniqueName: \"kubernetes.io/projected/e07d2efa-6aaa-4deb-9617-75f0869dc574-kube-api-access-vxqbx\") pod \"test-pod-1\" (UID: \"e07d2efa-6aaa-4deb-9617-75f0869dc574\") " pod="default/test-pod-1" May 10 00:47:35.221821 systemd[1]: run-containerd-runc-k8s.io-fdde6be3f29cafb2e699c4d92018dd2af569078a7c1c59574e94095d5dfcd87f-runc.PBhHV7.mount: Deactivated successfully. May 10 00:47:35.320224 kernel: Failed to create system directory netfs May 10 00:47:35.320379 kernel: kauditd_printk_skb: 68 callbacks suppressed May 10 00:47:35.320409 kernel: audit: type=1400 audit(1746838055.313:725): avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.313000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.342869 kernel: Failed to create system directory netfs May 10 00:47:35.343019 kernel: audit: type=1400 audit(1746838055.313:725): avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.313000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.367203 kernel: Failed to create system directory netfs May 10 00:47:35.367339 kernel: audit: type=1400 audit(1746838055.313:725): avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.313000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.388934 kernel: Failed to create system directory netfs May 10 00:47:35.389066 kernel: audit: type=1400 audit(1746838055.313:725): avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.313000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.313000 audit[3452]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a051f215e0 a1=153bc a2=55a03b9822b0 a3=5 items=0 ppid=1203 pid=3452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:35.313000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:47:35.454122 kernel: audit: type=1300 audit(1746838055.313:725): arch=c000003e syscall=175 success=yes exit=0 a0=55a051f215e0 a1=153bc a2=55a03b9822b0 a3=5 items=0 ppid=1203 pid=3452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:35.459255 kernel: audit: type=1327 audit(1746838055.313:725): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:47:35.459338 kernel: Failed to create system directory fscache May 10 00:47:35.459368 kernel: audit: type=1400 audit(1746838055.447:726): avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.447000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.487663 kernel: Failed to create system directory fscache May 10 00:47:35.487790 kernel: audit: type=1400 audit(1746838055.447:726): avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.447000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.509452 kernel: Failed to create system directory fscache May 10 00:47:35.509583 kernel: audit: type=1400 audit(1746838055.447:726): avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.447000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.530974 kernel: Failed to create system directory fscache May 10 00:47:35.531096 kernel: audit: type=1400 audit(1746838055.447:726): avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.447000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.550478 kernel: Failed to create system directory fscache May 10 00:47:35.447000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.447000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.554899 kernel: Failed to create system directory fscache May 10 00:47:35.447000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.563718 kernel: Failed to create system directory fscache May 10 00:47:35.563799 kernel: Failed to create system directory fscache May 10 00:47:35.447000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.447000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.571072 kernel: Failed to create system directory fscache May 10 00:47:35.571152 kernel: Failed to create system directory fscache May 10 00:47:35.447000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.447000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.581644 kernel: Failed to create system directory fscache May 10 00:47:35.581754 kernel: Failed to create system directory fscache May 10 00:47:35.447000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.582985 kubelet[1954]: E0510 00:47:35.582929 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:35.447000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.588923 kernel: Failed to create system directory fscache May 10 00:47:35.589000 kernel: Failed to create system directory fscache May 10 00:47:35.447000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.595988 kernel: FS-Cache: Loaded May 10 00:47:35.447000 audit[3452]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a0521369c0 a1=4c0fc a2=55a03b9822b0 a3=5 items=0 ppid=1203 pid=3452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:35.447000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.675908 kernel: Failed to create system directory sunrpc May 10 00:47:35.676019 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.685619 kernel: Failed to create system directory sunrpc May 10 00:47:35.685695 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.699782 kernel: Failed to create system directory sunrpc May 10 00:47:35.701501 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.708491 kernel: Failed to create system directory sunrpc May 10 00:47:35.708574 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.715825 kernel: Failed to create system directory sunrpc May 10 00:47:35.715922 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.726947 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.735300 kernel: Failed to create system directory sunrpc May 10 00:47:35.735367 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.742763 kernel: Failed to create system directory sunrpc May 10 00:47:35.743658 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.752171 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.752917 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.758660 kernel: Failed to create system directory sunrpc May 10 00:47:35.759007 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.766543 kernel: Failed to create system directory sunrpc May 10 00:47:35.766609 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.775015 kernel: Failed to create system directory sunrpc May 10 00:47:35.775071 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.783438 kernel: Failed to create system directory sunrpc May 10 00:47:35.784326 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.791492 kernel: Failed to create system directory sunrpc May 10 00:47:35.791561 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.801735 kernel: Failed to create system directory sunrpc May 10 00:47:35.801833 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.810345 kernel: Failed to create system directory sunrpc May 10 00:47:35.813340 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.818939 kernel: Failed to create system directory sunrpc May 10 00:47:35.818984 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.827863 kernel: Failed to create system directory sunrpc May 10 00:47:35.827945 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.836263 kernel: Failed to create system directory sunrpc May 10 00:47:35.837640 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.844231 kernel: Failed to create system directory sunrpc May 10 00:47:35.844295 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.851973 kernel: Failed to create system directory sunrpc May 10 00:47:35.852282 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.859409 kernel: Failed to create system directory sunrpc May 10 00:47:35.859465 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.863936 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.890454 kernel: Failed to create system directory sunrpc May 10 00:47:35.890540 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.896906 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.904527 kernel: Failed to create system directory sunrpc May 10 00:47:35.904596 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.924518 kernel: Failed to create system directory sunrpc May 10 00:47:35.924742 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.932431 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.936263 kernel: Failed to create system directory sunrpc May 10 00:47:35.936360 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.939797 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.947487 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.951468 kernel: Failed to create system directory sunrpc May 10 00:47:35.951541 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.958858 kernel: Failed to create system directory sunrpc May 10 00:47:35.958949 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.965063 kernel: Failed to create system directory sunrpc May 10 00:47:35.965117 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.972980 kernel: Failed to create system directory sunrpc May 10 00:47:35.973667 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.980516 kernel: Failed to create system directory sunrpc May 10 00:47:35.980577 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.985958 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.992597 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.996923 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.000664 kernel: Failed to create system directory sunrpc May 10 00:47:36.001449 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.007679 kernel: Failed to create system directory sunrpc May 10 00:47:36.007736 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.016118 kernel: Failed to create system directory sunrpc May 10 00:47:36.017124 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.026206 kernel: Failed to create system directory sunrpc May 10 00:47:36.026349 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.037116 kernel: Failed to create system directory sunrpc May 10 00:47:36.037257 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.040693 kernel: Failed to create system directory sunrpc May 10 00:47:36.040773 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.047347 kernel: Failed to create system directory sunrpc May 10 00:47:36.050627 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.051942 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.075895 kernel: Failed to create system directory sunrpc May 10 00:47:36.076014 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.089002 kernel: Failed to create system directory sunrpc May 10 00:47:36.089100 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.095282 kernel: Failed to create system directory sunrpc May 10 00:47:36.095362 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.102639 kernel: Failed to create system directory sunrpc May 10 00:47:36.102748 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.107563 kernel: Failed to create system directory sunrpc May 10 00:47:36.107651 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.112564 kernel: Failed to create system directory sunrpc May 10 00:47:36.112615 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.117987 kernel: Failed to create system directory sunrpc May 10 00:47:36.118053 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.122958 kernel: Failed to create system directory sunrpc May 10 00:47:36.123010 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.127864 kernel: Failed to create system directory sunrpc May 10 00:47:36.127930 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.138633 kernel: Failed to create system directory sunrpc May 10 00:47:36.138719 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.144727 kernel: Failed to create system directory sunrpc May 10 00:47:36.144797 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.151716 kernel: Failed to create system directory sunrpc May 10 00:47:36.154426 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.158996 kernel: Failed to create system directory sunrpc May 10 00:47:36.159048 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.165924 kernel: Failed to create system directory sunrpc May 10 00:47:36.165968 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.181165 kernel: Failed to create system directory sunrpc May 10 00:47:36.181282 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.186614 kernel: Failed to create system directory sunrpc May 10 00:47:36.186753 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.189046 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.195794 kernel: Failed to create system directory sunrpc May 10 00:47:36.198021 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.201756 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.205898 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.213977 kernel: Failed to create system directory sunrpc May 10 00:47:36.214037 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.222396 kernel: Failed to create system directory sunrpc May 10 00:47:36.223204 kernel: Failed to create system directory sunrpc May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:35.657000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.228678 kernel: Failed to create system directory sunrpc May 10 00:47:36.245364 kernel: RPC: Registered named UNIX socket transport module. May 10 00:47:36.245496 kernel: RPC: Registered udp transport module. May 10 00:47:36.245534 kernel: RPC: Registered tcp transport module. May 10 00:47:36.247081 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 10 00:47:35.657000 audit[3452]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a052182ad0 a1=1a814c a2=55a03b9822b0 a3=5 items=6 ppid=1203 pid=3452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:35.657000 audit: CWD cwd="/" May 10 00:47:35.657000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:47:35.657000 audit: PATH item=1 name=(null) inode=27601 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:47:35.657000 audit: PATH item=2 name=(null) inode=27601 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:47:35.657000 audit: PATH item=3 name=(null) inode=27602 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:47:35.657000 audit: PATH item=4 name=(null) inode=27601 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:47:35.657000 audit: PATH item=5 name=(null) inode=27603 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:47:35.657000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.340752 kernel: Failed to create system directory nfs May 10 00:47:36.340847 kernel: Failed to create system directory nfs May 10 00:47:36.340870 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.350999 kernel: Failed to create system directory nfs May 10 00:47:36.351086 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.359650 kernel: Failed to create system directory nfs May 10 00:47:36.359745 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.363311 kernel: Failed to create system directory nfs May 10 00:47:36.363377 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.375168 kernel: Failed to create system directory nfs May 10 00:47:36.376770 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.378642 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.384675 kernel: Failed to create system directory nfs May 10 00:47:36.384739 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.388943 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.391955 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.396874 kernel: Failed to create system directory nfs May 10 00:47:36.396949 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.402702 kernel: Failed to create system directory nfs May 10 00:47:36.402795 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.411476 kernel: Failed to create system directory nfs May 10 00:47:36.411586 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.417658 kernel: Failed to create system directory nfs May 10 00:47:36.417733 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.422918 kernel: Failed to create system directory nfs May 10 00:47:36.422988 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.425546 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.430554 kernel: Failed to create system directory nfs May 10 00:47:36.430619 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.435815 kernel: Failed to create system directory nfs May 10 00:47:36.435889 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.438423 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.441035 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.444624 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.456678 kernel: Failed to create system directory nfs May 10 00:47:36.456807 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.463260 kernel: Failed to create system directory nfs May 10 00:47:36.463332 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.472093 kernel: Failed to create system directory nfs May 10 00:47:36.472794 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.477492 kernel: Failed to create system directory nfs May 10 00:47:36.477560 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.487396 kernel: Failed to create system directory nfs May 10 00:47:36.487466 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.490698 kernel: Failed to create system directory nfs May 10 00:47:36.490741 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.494933 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.499119 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.504426 kernel: Failed to create system directory nfs May 10 00:47:36.504488 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.507674 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.517477 kernel: Failed to create system directory nfs May 10 00:47:36.517529 kernel: Failed to create system directory nfs May 10 00:47:36.517549 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.524101 kernel: Failed to create system directory nfs May 10 00:47:36.524153 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.527002 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.531904 kernel: Failed to create system directory nfs May 10 00:47:36.531950 kernel: Failed to create system directory nfs May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.324000 audit[3452]: AVC avc: denied { confidentiality } for pid=3452 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.538187 kernel: Failed to create system directory nfs May 10 00:47:36.562910 kernel: FS-Cache: Netfs 'nfs' registered for caching May 10 00:47:36.324000 audit[3452]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a0523a3a10 a1=16eae4 a2=55a03b9822b0 a3=5 items=0 ppid=1203 pid=3452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:36.324000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 00:47:36.583241 kubelet[1954]: E0510 00:47:36.583186 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.643078 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.651920 kernel: Failed to create system directory nfs4 May 10 00:47:36.651997 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.657728 kernel: Failed to create system directory nfs4 May 10 00:47:36.657794 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.663566 kernel: Failed to create system directory nfs4 May 10 00:47:36.663632 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.676219 kernel: Failed to create system directory nfs4 May 10 00:47:36.676306 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.682821 kernel: Failed to create system directory nfs4 May 10 00:47:36.682908 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.686394 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.692853 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.694945 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.701478 kernel: Failed to create system directory nfs4 May 10 00:47:36.701549 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.708014 kernel: Failed to create system directory nfs4 May 10 00:47:36.708087 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.714977 kernel: Failed to create system directory nfs4 May 10 00:47:36.715047 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.721967 kernel: Failed to create system directory nfs4 May 10 00:47:36.722011 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.728481 kernel: Failed to create system directory nfs4 May 10 00:47:36.728541 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.735300 kernel: Failed to create system directory nfs4 May 10 00:47:36.735378 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.742999 kernel: Failed to create system directory nfs4 May 10 00:47:36.743071 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.751173 kernel: Failed to create system directory nfs4 May 10 00:47:36.751240 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.758464 kernel: Failed to create system directory nfs4 May 10 00:47:36.758534 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.765204 kernel: Failed to create system directory nfs4 May 10 00:47:36.765257 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.772242 kernel: Failed to create system directory nfs4 May 10 00:47:36.772981 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.775084 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.781418 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.788224 kernel: Failed to create system directory nfs4 May 10 00:47:36.788280 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.791979 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.794688 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.799008 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.802945 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.809963 kernel: Failed to create system directory nfs4 May 10 00:47:36.810025 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.811134 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.814174 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.819620 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.824773 kernel: Failed to create system directory nfs4 May 10 00:47:36.824845 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.831759 kernel: Failed to create system directory nfs4 May 10 00:47:36.831812 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.836021 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.838774 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.841949 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.848742 kernel: Failed to create system directory nfs4 May 10 00:47:36.848818 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.851167 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.853719 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.859934 kernel: Failed to create system directory nfs4 May 10 00:47:36.859990 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.866565 kernel: Failed to create system directory nfs4 May 10 00:47:36.866628 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.869940 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.876366 kernel: Failed to create system directory nfs4 May 10 00:47:36.876429 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.879701 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.883032 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.889923 kernel: Failed to create system directory nfs4 May 10 00:47:36.889978 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.903285 kernel: Failed to create system directory nfs4 May 10 00:47:36.903816 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.906973 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.913630 kernel: Failed to create system directory nfs4 May 10 00:47:36.913686 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.917713 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.923725 kernel: Failed to create system directory nfs4 May 10 00:47:36.923790 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.930785 kernel: Failed to create system directory nfs4 May 10 00:47:36.930849 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.937678 kernel: Failed to create system directory nfs4 May 10 00:47:36.937749 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.944004 kernel: Failed to create system directory nfs4 May 10 00:47:36.944058 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.950959 kernel: Failed to create system directory nfs4 May 10 00:47:36.951026 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.957919 kernel: Failed to create system directory nfs4 May 10 00:47:36.957982 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.968562 kernel: Failed to create system directory nfs4 May 10 00:47:36.968627 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.972055 kernel: Failed to create system directory nfs4 May 10 00:47:36.972109 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:36.975360 kernel: Failed to create system directory nfs4 May 10 00:47:36.621000 audit[3457]: AVC avc: denied { confidentiality } for pid=3457 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.094538 kernel: NFS: Registering the id_resolver key type May 10 00:47:37.094689 kernel: Key type id_resolver registered May 10 00:47:37.094719 kernel: Key type id_legacy registered May 10 00:47:36.621000 audit[3457]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f5df5da9010 a1=209404 a2=562bdc3402b0 a3=5 items=0 ppid=1203 pid=3457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:36.621000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.141535 kernel: Failed to create system directory rpcgss May 10 00:47:37.141623 kernel: Failed to create system directory rpcgss May 10 00:47:37.141646 kernel: Failed to create system directory rpcgss May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.152423 kernel: Failed to create system directory rpcgss May 10 00:47:37.152499 kernel: Failed to create system directory rpcgss May 10 00:47:37.152534 kernel: Failed to create system directory rpcgss May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.160997 kernel: Failed to create system directory rpcgss May 10 00:47:37.161081 kernel: Failed to create system directory rpcgss May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.171332 kernel: Failed to create system directory rpcgss May 10 00:47:37.171535 kernel: Failed to create system directory rpcgss May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.175389 kernel: Failed to create system directory rpcgss May 10 00:47:37.175459 kernel: Failed to create system directory rpcgss May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.182604 kernel: Failed to create system directory rpcgss May 10 00:47:37.182673 kernel: Failed to create system directory rpcgss May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.192230 kernel: Failed to create system directory rpcgss May 10 00:47:37.192303 kernel: Failed to create system directory rpcgss May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.194977 kernel: Failed to create system directory rpcgss May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.201971 kernel: Failed to create system directory rpcgss May 10 00:47:37.202054 kernel: Failed to create system directory rpcgss May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.206990 kernel: Failed to create system directory rpcgss May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.214966 kernel: Failed to create system directory rpcgss May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.221174 kernel: Failed to create system directory rpcgss May 10 00:47:37.221251 kernel: Failed to create system directory rpcgss May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.228130 kernel: Failed to create system directory rpcgss May 10 00:47:37.228187 kernel: Failed to create system directory rpcgss May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.129000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:37.235088 kernel: Failed to create system directory rpcgss May 10 00:47:37.129000 audit[3458]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f7e2d478010 a1=70b64 a2=561da591f2b0 a3=5 items=0 ppid=1203 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:37.129000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 10 00:47:37.550228 nfsidmap[3465]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.7-n-a3a45e53be' May 10 00:47:37.567930 nfsidmap[3466]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.7-n-a3a45e53be' May 10 00:47:37.580000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2765 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:47:37.580000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2765 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:47:37.580000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2765 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:47:37.580000 audit[1512]: AVC avc: denied { watch_reads } for pid=1512 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2765 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:47:37.580000 audit[1512]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55bde1eb3b50 a2=10 a3=847dbdce57ca164c items=0 ppid=1 pid=1512 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:37.580000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 10 00:47:37.580000 audit[1512]: AVC avc: denied { watch_reads } for pid=1512 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2765 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:47:37.580000 audit[1512]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55bde1eb3b50 a2=10 a3=847dbdce57ca164c items=0 ppid=1 pid=1512 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:37.580000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 10 00:47:37.580000 audit[1512]: AVC avc: denied { watch_reads } for pid=1512 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2765 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 00:47:37.580000 audit[1512]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55bde1eb3b50 a2=10 a3=847dbdce57ca164c items=0 ppid=1 pid=1512 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:37.580000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 10 00:47:37.584300 kubelet[1954]: E0510 00:47:37.584262 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:37.702060 env[1406]: time="2025-05-10T00:47:37.701700164Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:e07d2efa-6aaa-4deb-9617-75f0869dc574,Namespace:default,Attempt:0,}" May 10 00:47:37.883594 systemd-networkd[1554]: cali5ec59c6bf6e: Link UP May 10 00:47:37.891792 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:47:37.891968 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 10 00:47:37.892662 systemd-networkd[1554]: cali5ec59c6bf6e: Gained carrier May 10 00:47:37.907070 env[1406]: 2025-05-10 00:47:37.810 [INFO][3468] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.32-k8s-test--pod--1-eth0 default e07d2efa-6aaa-4deb-9617-75f0869dc574 1382 0 2025-05-10 00:47:00 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.32 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.32-k8s-test--pod--1-" May 10 00:47:37.907070 env[1406]: 2025-05-10 00:47:37.810 [INFO][3468] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.32-k8s-test--pod--1-eth0" May 10 00:47:37.907070 env[1406]: 2025-05-10 00:47:37.835 [INFO][3481] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2" HandleID="k8s-pod-network.5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2" Workload="10.200.8.32-k8s-test--pod--1-eth0" May 10 00:47:37.907070 env[1406]: 2025-05-10 00:47:37.848 [INFO][3481] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2" HandleID="k8s-pod-network.5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2" Workload="10.200.8.32-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000294b20), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.32", "pod":"test-pod-1", "timestamp":"2025-05-10 00:47:37.835149757 +0000 UTC"}, Hostname:"10.200.8.32", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:47:37.907070 env[1406]: 2025-05-10 00:47:37.848 [INFO][3481] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:37.907070 env[1406]: 2025-05-10 00:47:37.848 [INFO][3481] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:37.907070 env[1406]: 2025-05-10 00:47:37.848 [INFO][3481] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.32' May 10 00:47:37.907070 env[1406]: 2025-05-10 00:47:37.850 [INFO][3481] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2" host="10.200.8.32" May 10 00:47:37.907070 env[1406]: 2025-05-10 00:47:37.853 [INFO][3481] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.8.32" May 10 00:47:37.907070 env[1406]: 2025-05-10 00:47:37.857 [INFO][3481] ipam/ipam.go 489: Trying affinity for 192.168.124.128/26 host="10.200.8.32" May 10 00:47:37.907070 env[1406]: 2025-05-10 00:47:37.858 [INFO][3481] ipam/ipam.go 155: Attempting to load block cidr=192.168.124.128/26 host="10.200.8.32" May 10 00:47:37.907070 env[1406]: 2025-05-10 00:47:37.861 [INFO][3481] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.124.128/26 host="10.200.8.32" May 10 00:47:37.907070 env[1406]: 2025-05-10 00:47:37.861 [INFO][3481] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.124.128/26 handle="k8s-pod-network.5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2" host="10.200.8.32" May 10 00:47:37.907070 env[1406]: 2025-05-10 00:47:37.862 [INFO][3481] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2 May 10 00:47:37.907070 env[1406]: 2025-05-10 00:47:37.870 [INFO][3481] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.124.128/26 handle="k8s-pod-network.5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2" host="10.200.8.32" May 10 00:47:37.907070 env[1406]: 2025-05-10 00:47:37.879 [INFO][3481] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.124.132/26] block=192.168.124.128/26 handle="k8s-pod-network.5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2" host="10.200.8.32" May 10 00:47:37.907070 env[1406]: 2025-05-10 00:47:37.879 [INFO][3481] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.124.132/26] handle="k8s-pod-network.5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2" host="10.200.8.32" May 10 00:47:37.907070 env[1406]: 2025-05-10 00:47:37.879 [INFO][3481] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:37.907070 env[1406]: 2025-05-10 00:47:37.879 [INFO][3481] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.124.132/26] IPv6=[] ContainerID="5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2" HandleID="k8s-pod-network.5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2" Workload="10.200.8.32-k8s-test--pod--1-eth0" May 10 00:47:37.907070 env[1406]: 2025-05-10 00:47:37.880 [INFO][3468] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.32-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.32-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"e07d2efa-6aaa-4deb-9617-75f0869dc574", ResourceVersion:"1382", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 47, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.32", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.124.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:37.908657 env[1406]: 2025-05-10 00:47:37.881 [INFO][3468] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.124.132/32] ContainerID="5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.32-k8s-test--pod--1-eth0" May 10 00:47:37.908657 env[1406]: 2025-05-10 00:47:37.881 [INFO][3468] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.32-k8s-test--pod--1-eth0" May 10 00:47:37.908657 env[1406]: 2025-05-10 00:47:37.897 [INFO][3468] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.32-k8s-test--pod--1-eth0" May 10 00:47:37.908657 env[1406]: 2025-05-10 00:47:37.897 [INFO][3468] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.32-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.32-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"e07d2efa-6aaa-4deb-9617-75f0869dc574", ResourceVersion:"1382", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 47, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.32", ContainerID:"5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.124.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"ea:dc:3f:33:77:e2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:47:37.908657 env[1406]: 2025-05-10 00:47:37.905 [INFO][3468] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.32-k8s-test--pod--1-eth0" May 10 00:47:37.922000 audit[3502]: NETFILTER_CFG table=filter:85 family=2 entries=38 op=nft_register_chain pid=3502 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:47:37.922000 audit[3502]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffd0684a8b0 a2=0 a3=7ffd0684a89c items=0 ppid=2611 pid=3502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:37.922000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:47:37.929979 env[1406]: time="2025-05-10T00:47:37.929864793Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:47:37.930186 env[1406]: time="2025-05-10T00:47:37.929951393Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:47:37.930186 env[1406]: time="2025-05-10T00:47:37.929966293Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:47:37.930186 env[1406]: time="2025-05-10T00:47:37.930093793Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2 pid=3511 runtime=io.containerd.runc.v2 May 10 00:47:37.949776 systemd[1]: Started cri-containerd-5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2.scope. May 10 00:47:37.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.962000 audit: BPF prog-id=124 op=LOAD May 10 00:47:37.963000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3511 pid=3520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:37.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565306630336263336637323037376636636638643532396363343733 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3511 pid=3520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:37.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565306630336263336637323037376636636638643532396363343733 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit: BPF prog-id=125 op=LOAD May 10 00:47:37.963000 audit[3520]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003f07f0 items=0 ppid=3511 pid=3520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:37.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565306630336263336637323037376636636638643532396363343733 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit: BPF prog-id=126 op=LOAD May 10 00:47:37.963000 audit[3520]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003f0838 items=0 ppid=3511 pid=3520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:37.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565306630336263336637323037376636636638643532396363343733 May 10 00:47:37.963000 audit: BPF prog-id=126 op=UNLOAD May 10 00:47:37.963000 audit: BPF prog-id=125 op=UNLOAD May 10 00:47:37.963000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { perfmon } for pid=3520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit[3520]: AVC avc: denied { bpf } for pid=3520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:37.963000 audit: BPF prog-id=127 op=LOAD May 10 00:47:37.963000 audit[3520]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f0c48 items=0 ppid=3511 pid=3520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:37.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565306630336263336637323037376636636638643532396363343733 May 10 00:47:38.004758 env[1406]: time="2025-05-10T00:47:38.004661901Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:e07d2efa-6aaa-4deb-9617-75f0869dc574,Namespace:default,Attempt:0,} returns sandbox id \"5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2\"" May 10 00:47:38.007351 env[1406]: time="2025-05-10T00:47:38.007316104Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 10 00:47:38.329628 env[1406]: time="2025-05-10T00:47:38.329570561Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:38.337403 env[1406]: time="2025-05-10T00:47:38.337354973Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:38.341132 env[1406]: time="2025-05-10T00:47:38.341088078Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:38.345804 env[1406]: time="2025-05-10T00:47:38.345763584Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:47:38.346422 env[1406]: time="2025-05-10T00:47:38.346387485Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 10 00:47:38.349137 env[1406]: time="2025-05-10T00:47:38.349106489Z" level=info msg="CreateContainer within sandbox \"5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 10 00:47:38.386216 env[1406]: time="2025-05-10T00:47:38.386159642Z" level=info msg="CreateContainer within sandbox \"5e0f03bc3f72077f6cf8d529cc473ea0ad0094856152e742b932982fe9a934a2\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"5c44d72d55a4594f81c659ba4119151d63fa6dc8a6c370345a77b42dda4e86cb\"" May 10 00:47:38.386917 env[1406]: time="2025-05-10T00:47:38.386753443Z" level=info msg="StartContainer for \"5c44d72d55a4594f81c659ba4119151d63fa6dc8a6c370345a77b42dda4e86cb\"" May 10 00:47:38.402455 systemd[1]: Started cri-containerd-5c44d72d55a4594f81c659ba4119151d63fa6dc8a6c370345a77b42dda4e86cb.scope. May 10 00:47:38.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit: BPF prog-id=128 op=LOAD May 10 00:47:38.416000 audit[3555]: AVC avc: denied { bpf } for pid=3555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3511 pid=3555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:38.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563343464373264353561343539346638316336353962613431313931 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { perfmon } for pid=3555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3511 pid=3555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:38.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563343464373264353561343539346638316336353962613431313931 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { bpf } for pid=3555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { bpf } for pid=3555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { bpf } for pid=3555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { perfmon } for pid=3555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { perfmon } for pid=3555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { perfmon } for pid=3555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { perfmon } for pid=3555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { perfmon } for pid=3555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { bpf } for pid=3555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { bpf } for pid=3555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit: BPF prog-id=129 op=LOAD May 10 00:47:38.416000 audit[3555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001c80c0 items=0 ppid=3511 pid=3555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:38.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563343464373264353561343539346638316336353962613431313931 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { bpf } for pid=3555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { bpf } for pid=3555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { perfmon } for pid=3555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { perfmon } for pid=3555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { perfmon } for pid=3555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { perfmon } for pid=3555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { perfmon } for pid=3555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { bpf } for pid=3555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { bpf } for pid=3555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit: BPF prog-id=130 op=LOAD May 10 00:47:38.416000 audit[3555]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001c8108 items=0 ppid=3511 pid=3555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:38.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563343464373264353561343539346638316336353962613431313931 May 10 00:47:38.416000 audit: BPF prog-id=130 op=UNLOAD May 10 00:47:38.416000 audit: BPF prog-id=129 op=UNLOAD May 10 00:47:38.416000 audit[3555]: AVC avc: denied { bpf } for pid=3555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { bpf } for pid=3555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { bpf } for pid=3555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { perfmon } for pid=3555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { perfmon } for pid=3555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { perfmon } for pid=3555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { perfmon } for pid=3555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { perfmon } for pid=3555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { bpf } for pid=3555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit[3555]: AVC avc: denied { bpf } for pid=3555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:38.416000 audit: BPF prog-id=131 op=LOAD May 10 00:47:38.416000 audit[3555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001c8518 items=0 ppid=3511 pid=3555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:38.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563343464373264353561343539346638316336353962613431313931 May 10 00:47:38.435480 env[1406]: time="2025-05-10T00:47:38.435424712Z" level=info msg="StartContainer for \"5c44d72d55a4594f81c659ba4119151d63fa6dc8a6c370345a77b42dda4e86cb\" returns successfully" May 10 00:47:38.585452 kubelet[1954]: E0510 00:47:38.585346 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:38.828564 kubelet[1954]: I0510 00:47:38.828494 1954 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=38.487315785 podStartE2EDuration="38.828470569s" podCreationTimestamp="2025-05-10 00:47:00 +0000 UTC" firstStartedPulling="2025-05-10 00:47:38.006582203 +0000 UTC m=+79.172743987" lastFinishedPulling="2025-05-10 00:47:38.347736987 +0000 UTC m=+79.513898771" observedRunningTime="2025-05-10 00:47:38.828185969 +0000 UTC m=+79.994347853" watchObservedRunningTime="2025-05-10 00:47:38.828470569 +0000 UTC m=+79.994632453" May 10 00:47:39.439123 systemd-networkd[1554]: cali5ec59c6bf6e: Gained IPv6LL May 10 00:47:39.509986 kubelet[1954]: E0510 00:47:39.509916 1954 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:39.586562 kubelet[1954]: E0510 00:47:39.586508 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:40.587347 kubelet[1954]: E0510 00:47:40.587293 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:41.587485 kubelet[1954]: E0510 00:47:41.587432 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 00:47:42.588236 kubelet[1954]: E0510 00:47:42.588196 1954 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"