May 10 02:16:32.945018 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 9 23:12:23 -00 2025 May 10 02:16:32.949150 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 02:16:32.949173 kernel: BIOS-provided physical RAM map: May 10 02:16:32.949184 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 10 02:16:32.949194 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 10 02:16:32.949204 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 10 02:16:32.949215 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable May 10 02:16:32.949225 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved May 10 02:16:32.949235 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 10 02:16:32.949245 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved May 10 02:16:32.949260 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 10 02:16:32.949271 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 10 02:16:32.949281 kernel: NX (Execute Disable) protection: active May 10 02:16:32.949291 kernel: SMBIOS 2.8 present. May 10 02:16:32.949304 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 May 10 02:16:32.949315 kernel: Hypervisor detected: KVM May 10 02:16:32.949342 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 10 02:16:32.949353 kernel: kvm-clock: cpu 0, msr 77196001, primary cpu clock May 10 02:16:32.949364 kernel: kvm-clock: using sched offset of 4922342872 cycles May 10 02:16:32.949375 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 10 02:16:32.949398 kernel: tsc: Detected 2499.998 MHz processor May 10 02:16:32.949409 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 10 02:16:32.949419 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 10 02:16:32.949430 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 May 10 02:16:32.949440 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 10 02:16:32.949467 kernel: Using GB pages for direct mapping May 10 02:16:32.949478 kernel: ACPI: Early table checksum verification disabled May 10 02:16:32.949489 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) May 10 02:16:32.949500 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 02:16:32.949523 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 10 02:16:32.949533 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 02:16:32.949544 kernel: ACPI: FACS 0x000000007FFDFD40 000040 May 10 02:16:32.949554 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 02:16:32.949564 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 02:16:32.949593 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 02:16:32.949604 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 02:16:32.949617 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] May 10 02:16:32.949628 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] May 10 02:16:32.949639 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] May 10 02:16:32.949650 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] May 10 02:16:32.949667 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] May 10 02:16:32.949683 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] May 10 02:16:32.949695 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] May 10 02:16:32.949707 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 10 02:16:32.949718 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 10 02:16:32.949730 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 May 10 02:16:32.949742 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 May 10 02:16:32.949753 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 May 10 02:16:32.949773 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 May 10 02:16:32.949785 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 May 10 02:16:32.949796 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 May 10 02:16:32.949808 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 May 10 02:16:32.949819 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 May 10 02:16:32.949835 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 May 10 02:16:32.949847 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 May 10 02:16:32.949858 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 May 10 02:16:32.949870 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 May 10 02:16:32.949893 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 May 10 02:16:32.949908 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 May 10 02:16:32.949920 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] May 10 02:16:32.949931 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] May 10 02:16:32.949955 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug May 10 02:16:32.949967 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] May 10 02:16:32.949979 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] May 10 02:16:32.949991 kernel: Zone ranges: May 10 02:16:32.950003 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 10 02:16:32.950014 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] May 10 02:16:32.950035 kernel: Normal empty May 10 02:16:32.950070 kernel: Movable zone start for each node May 10 02:16:32.950083 kernel: Early memory node ranges May 10 02:16:32.950095 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 10 02:16:32.950106 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] May 10 02:16:32.950118 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] May 10 02:16:32.950130 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 02:16:32.950141 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 10 02:16:32.950153 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges May 10 02:16:32.950170 kernel: ACPI: PM-Timer IO Port: 0x608 May 10 02:16:32.950182 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 10 02:16:32.950194 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 10 02:16:32.950206 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 10 02:16:32.950217 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 10 02:16:32.950229 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 10 02:16:32.950241 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 10 02:16:32.950253 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 10 02:16:32.950264 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 10 02:16:32.950280 kernel: TSC deadline timer available May 10 02:16:32.950292 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs May 10 02:16:32.950304 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices May 10 02:16:32.950316 kernel: Booting paravirtualized kernel on KVM May 10 02:16:32.950328 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 10 02:16:32.950340 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 May 10 02:16:32.950352 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 May 10 02:16:32.950364 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 May 10 02:16:32.950375 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 May 10 02:16:32.950391 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 May 10 02:16:32.950403 kernel: kvm-guest: PV spinlocks enabled May 10 02:16:32.950415 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 10 02:16:32.950427 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 May 10 02:16:32.950438 kernel: Policy zone: DMA32 May 10 02:16:32.950476 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 02:16:32.950490 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 10 02:16:32.950501 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 10 02:16:32.950518 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 10 02:16:32.950542 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 10 02:16:32.950565 kernel: Memory: 1903832K/2096616K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 192524K reserved, 0K cma-reserved) May 10 02:16:32.950578 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 May 10 02:16:32.950589 kernel: Kernel/User page tables isolation: enabled May 10 02:16:32.950601 kernel: ftrace: allocating 34584 entries in 136 pages May 10 02:16:32.950613 kernel: ftrace: allocated 136 pages with 2 groups May 10 02:16:32.950625 kernel: rcu: Hierarchical RCU implementation. May 10 02:16:32.950637 kernel: rcu: RCU event tracing is enabled. May 10 02:16:32.950654 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. May 10 02:16:32.950666 kernel: Rude variant of Tasks RCU enabled. May 10 02:16:32.950678 kernel: Tracing variant of Tasks RCU enabled. May 10 02:16:32.950690 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 10 02:16:32.950702 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 May 10 02:16:32.950714 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 May 10 02:16:32.950726 kernel: random: crng init done May 10 02:16:32.950751 kernel: Console: colour VGA+ 80x25 May 10 02:16:32.950763 kernel: printk: console [tty0] enabled May 10 02:16:32.950776 kernel: printk: console [ttyS0] enabled May 10 02:16:32.950788 kernel: ACPI: Core revision 20210730 May 10 02:16:32.950800 kernel: APIC: Switch to symmetric I/O mode setup May 10 02:16:32.950816 kernel: x2apic enabled May 10 02:16:32.950829 kernel: Switched APIC routing to physical x2apic. May 10 02:16:32.950841 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns May 10 02:16:32.950854 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998) May 10 02:16:32.950867 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 10 02:16:32.950883 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 May 10 02:16:32.950896 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 May 10 02:16:32.950908 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 10 02:16:32.950920 kernel: Spectre V2 : Mitigation: Retpolines May 10 02:16:32.950942 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 10 02:16:32.950954 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls May 10 02:16:32.950967 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 10 02:16:32.950979 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 10 02:16:32.950991 kernel: MDS: Mitigation: Clear CPU buffers May 10 02:16:32.951004 kernel: MMIO Stale Data: Unknown: No mitigations May 10 02:16:32.951017 kernel: SRBDS: Unknown: Dependent on hypervisor status May 10 02:16:32.951051 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 10 02:16:32.951067 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 10 02:16:32.951079 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 10 02:16:32.951091 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 10 02:16:32.951104 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 10 02:16:32.951116 kernel: Freeing SMP alternatives memory: 32K May 10 02:16:32.951128 kernel: pid_max: default: 32768 minimum: 301 May 10 02:16:32.951141 kernel: LSM: Security Framework initializing May 10 02:16:32.951153 kernel: SELinux: Initializing. May 10 02:16:32.951165 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 10 02:16:32.951177 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 10 02:16:32.951195 kernel: smpboot: CPU0: Intel Xeon E3-12xx v2 (Ivy Bridge, IBRS) (family: 0x6, model: 0x3a, stepping: 0x9) May 10 02:16:32.951208 kernel: Performance Events: unsupported p6 CPU model 58 no PMU driver, software events only. May 10 02:16:32.951220 kernel: signal: max sigframe size: 1776 May 10 02:16:32.951233 kernel: rcu: Hierarchical SRCU implementation. May 10 02:16:32.951246 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 10 02:16:32.951258 kernel: smp: Bringing up secondary CPUs ... May 10 02:16:32.951270 kernel: x86: Booting SMP configuration: May 10 02:16:32.951283 kernel: .... node #0, CPUs: #1 May 10 02:16:32.951295 kernel: kvm-clock: cpu 1, msr 77196041, secondary cpu clock May 10 02:16:32.951312 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 May 10 02:16:32.951324 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 May 10 02:16:32.951337 kernel: smp: Brought up 1 node, 2 CPUs May 10 02:16:32.951349 kernel: smpboot: Max logical packages: 16 May 10 02:16:32.951361 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS) May 10 02:16:32.951374 kernel: devtmpfs: initialized May 10 02:16:32.951386 kernel: x86/mm: Memory block size: 128MB May 10 02:16:32.951399 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 10 02:16:32.951411 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) May 10 02:16:32.951428 kernel: pinctrl core: initialized pinctrl subsystem May 10 02:16:32.951441 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 10 02:16:32.951453 kernel: audit: initializing netlink subsys (disabled) May 10 02:16:32.951465 kernel: audit: type=2000 audit(1746843391.801:1): state=initialized audit_enabled=0 res=1 May 10 02:16:32.951478 kernel: thermal_sys: Registered thermal governor 'step_wise' May 10 02:16:32.951490 kernel: thermal_sys: Registered thermal governor 'user_space' May 10 02:16:32.951502 kernel: cpuidle: using governor menu May 10 02:16:32.951515 kernel: ACPI: bus type PCI registered May 10 02:16:32.951527 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 10 02:16:32.951544 kernel: dca service started, version 1.12.1 May 10 02:16:32.951556 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 10 02:16:32.951569 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 10 02:16:32.951581 kernel: PCI: Using configuration type 1 for base access May 10 02:16:32.951594 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 10 02:16:32.951606 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 10 02:16:32.951630 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 10 02:16:32.951642 kernel: ACPI: Added _OSI(Module Device) May 10 02:16:32.951654 kernel: ACPI: Added _OSI(Processor Device) May 10 02:16:32.951670 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 10 02:16:32.951695 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 10 02:16:32.951708 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 10 02:16:32.951720 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 10 02:16:32.951732 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 10 02:16:32.951745 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 10 02:16:32.951757 kernel: ACPI: Interpreter enabled May 10 02:16:32.951769 kernel: ACPI: PM: (supports S0 S5) May 10 02:16:32.951781 kernel: ACPI: Using IOAPIC for interrupt routing May 10 02:16:32.951798 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 10 02:16:32.951811 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 10 02:16:32.951823 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 10 02:16:32.956168 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 10 02:16:32.956343 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] May 10 02:16:32.956535 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 10 02:16:32.956554 kernel: PCI host bridge to bus 0000:00 May 10 02:16:32.956721 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 10 02:16:32.956875 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 10 02:16:32.957019 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 10 02:16:32.957197 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] May 10 02:16:32.957346 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 10 02:16:32.957507 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] May 10 02:16:32.957662 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 10 02:16:32.957850 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 10 02:16:32.958065 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 May 10 02:16:32.958231 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] May 10 02:16:32.958387 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] May 10 02:16:32.958545 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] May 10 02:16:32.958701 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 10 02:16:32.958868 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 May 10 02:16:32.959057 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] May 10 02:16:32.959238 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 May 10 02:16:32.959396 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] May 10 02:16:32.959592 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 May 10 02:16:32.959748 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] May 10 02:16:32.959924 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 May 10 02:16:32.965159 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] May 10 02:16:32.965340 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 May 10 02:16:32.965503 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] May 10 02:16:32.965679 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 May 10 02:16:32.965839 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] May 10 02:16:32.966007 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 May 10 02:16:32.966212 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] May 10 02:16:32.966380 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 May 10 02:16:32.966535 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] May 10 02:16:32.966699 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 May 10 02:16:32.966854 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] May 10 02:16:32.967006 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] May 10 02:16:32.967221 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] May 10 02:16:32.967377 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] May 10 02:16:32.967544 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 May 10 02:16:32.967699 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] May 10 02:16:32.967853 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] May 10 02:16:32.968007 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] May 10 02:16:32.968225 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 10 02:16:32.968403 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 10 02:16:32.968571 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 10 02:16:32.968726 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] May 10 02:16:32.968881 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] May 10 02:16:32.969072 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 10 02:16:32.969236 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] May 10 02:16:32.969408 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 May 10 02:16:32.969581 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] May 10 02:16:32.969741 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] May 10 02:16:32.969910 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] May 10 02:16:32.970114 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] May 10 02:16:32.970319 kernel: pci_bus 0000:02: extended config space not accessible May 10 02:16:32.970543 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 May 10 02:16:32.970735 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] May 10 02:16:32.970918 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] May 10 02:16:32.971116 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] May 10 02:16:32.971315 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 May 10 02:16:32.971518 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] May 10 02:16:32.971721 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] May 10 02:16:32.971900 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] May 10 02:16:32.981167 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] May 10 02:16:32.981377 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 May 10 02:16:32.981548 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] May 10 02:16:32.981736 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] May 10 02:16:32.981921 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] May 10 02:16:32.982119 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] May 10 02:16:32.982280 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] May 10 02:16:32.982447 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] May 10 02:16:32.982602 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] May 10 02:16:32.982771 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] May 10 02:16:32.982925 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] May 10 02:16:32.983107 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] May 10 02:16:32.983267 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] May 10 02:16:32.983422 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] May 10 02:16:32.983583 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] May 10 02:16:32.983752 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] May 10 02:16:32.983907 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] May 10 02:16:32.984089 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] May 10 02:16:32.984250 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] May 10 02:16:32.984414 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] May 10 02:16:32.984579 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] May 10 02:16:32.984598 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 10 02:16:32.984611 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 10 02:16:32.984624 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 10 02:16:32.984643 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 10 02:16:32.984657 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 10 02:16:32.984669 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 10 02:16:32.984682 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 10 02:16:32.984695 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 10 02:16:32.984707 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 10 02:16:32.984720 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 10 02:16:32.984732 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 10 02:16:32.984745 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 10 02:16:32.984763 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 10 02:16:32.984775 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 10 02:16:32.984788 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 10 02:16:32.984800 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 10 02:16:32.984813 kernel: iommu: Default domain type: Translated May 10 02:16:32.984826 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 10 02:16:32.984979 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 10 02:16:32.985168 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 10 02:16:32.985343 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 10 02:16:32.985362 kernel: vgaarb: loaded May 10 02:16:32.985374 kernel: pps_core: LinuxPPS API ver. 1 registered May 10 02:16:32.985400 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 10 02:16:32.985413 kernel: PTP clock support registered May 10 02:16:32.985425 kernel: PCI: Using ACPI for IRQ routing May 10 02:16:32.985438 kernel: PCI: pci_cache_line_size set to 64 bytes May 10 02:16:32.985451 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 10 02:16:32.985463 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] May 10 02:16:32.985481 kernel: clocksource: Switched to clocksource kvm-clock May 10 02:16:32.985494 kernel: VFS: Disk quotas dquot_6.6.0 May 10 02:16:32.985508 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 10 02:16:32.985520 kernel: pnp: PnP ACPI init May 10 02:16:32.985720 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved May 10 02:16:32.985742 kernel: pnp: PnP ACPI: found 5 devices May 10 02:16:32.985761 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 10 02:16:32.985774 kernel: NET: Registered PF_INET protocol family May 10 02:16:32.985793 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 10 02:16:32.985806 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 10 02:16:32.985825 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 10 02:16:32.985838 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 10 02:16:32.985851 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 10 02:16:32.985863 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 10 02:16:32.985876 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 10 02:16:32.985889 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 10 02:16:32.985903 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 10 02:16:32.985920 kernel: NET: Registered PF_XDP protocol family May 10 02:16:32.986109 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 May 10 02:16:32.986270 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 May 10 02:16:32.986428 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 May 10 02:16:32.986624 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 May 10 02:16:32.986813 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 May 10 02:16:32.987000 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 May 10 02:16:32.987208 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 May 10 02:16:32.987374 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 May 10 02:16:32.987536 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] May 10 02:16:32.987698 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] May 10 02:16:32.987852 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] May 10 02:16:32.988008 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] May 10 02:16:32.999242 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] May 10 02:16:32.999425 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] May 10 02:16:32.999596 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] May 10 02:16:32.999760 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] May 10 02:16:32.999925 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] May 10 02:16:33.000120 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] May 10 02:16:33.000281 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] May 10 02:16:33.000435 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] May 10 02:16:33.000599 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] May 10 02:16:33.000755 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] May 10 02:16:33.000916 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] May 10 02:16:33.001134 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] May 10 02:16:33.001292 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] May 10 02:16:33.001454 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] May 10 02:16:33.001610 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] May 10 02:16:33.001765 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] May 10 02:16:33.001920 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] May 10 02:16:33.002109 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] May 10 02:16:33.002282 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] May 10 02:16:33.002443 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] May 10 02:16:33.002609 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] May 10 02:16:33.002777 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] May 10 02:16:33.002943 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] May 10 02:16:33.003134 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] May 10 02:16:33.003295 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] May 10 02:16:33.003480 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] May 10 02:16:33.003650 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] May 10 02:16:33.003836 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] May 10 02:16:33.004005 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] May 10 02:16:33.004198 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] May 10 02:16:33.004366 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] May 10 02:16:33.004544 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] May 10 02:16:33.004729 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] May 10 02:16:33.004907 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] May 10 02:16:33.005107 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] May 10 02:16:33.005279 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] May 10 02:16:33.005453 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] May 10 02:16:33.005630 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] May 10 02:16:33.005797 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 10 02:16:33.005968 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 10 02:16:33.006150 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 10 02:16:33.006308 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] May 10 02:16:33.006472 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 10 02:16:33.006637 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] May 10 02:16:33.006811 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] May 10 02:16:33.006994 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] May 10 02:16:33.007189 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] May 10 02:16:33.007388 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] May 10 02:16:33.007564 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] May 10 02:16:33.007735 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] May 10 02:16:33.007914 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] May 10 02:16:33.014971 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] May 10 02:16:33.015174 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] May 10 02:16:33.015328 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] May 10 02:16:33.015489 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] May 10 02:16:33.015639 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] May 10 02:16:33.015813 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] May 10 02:16:33.016017 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] May 10 02:16:33.016212 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] May 10 02:16:33.016363 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] May 10 02:16:33.016520 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] May 10 02:16:33.016669 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] May 10 02:16:33.016817 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] May 10 02:16:33.016974 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] May 10 02:16:33.017158 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] May 10 02:16:33.017317 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] May 10 02:16:33.017477 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] May 10 02:16:33.017627 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] May 10 02:16:33.017776 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] May 10 02:16:33.017796 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 10 02:16:33.017810 kernel: PCI: CLS 0 bytes, default 64 May 10 02:16:33.017824 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 10 02:16:33.017837 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) May 10 02:16:33.017857 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 10 02:16:33.017871 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns May 10 02:16:33.017885 kernel: Initialise system trusted keyrings May 10 02:16:33.017898 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 10 02:16:33.017912 kernel: Key type asymmetric registered May 10 02:16:33.017924 kernel: Asymmetric key parser 'x509' registered May 10 02:16:33.017938 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 10 02:16:33.017951 kernel: io scheduler mq-deadline registered May 10 02:16:33.017969 kernel: io scheduler kyber registered May 10 02:16:33.017982 kernel: io scheduler bfq registered May 10 02:16:33.018206 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 May 10 02:16:33.018367 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 May 10 02:16:33.018524 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ May 10 02:16:33.018682 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 May 10 02:16:33.018840 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 May 10 02:16:33.018998 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ May 10 02:16:33.019197 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 May 10 02:16:33.019364 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 May 10 02:16:33.019523 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ May 10 02:16:33.019680 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 May 10 02:16:33.019838 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 May 10 02:16:33.019995 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ May 10 02:16:33.020217 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 May 10 02:16:33.020374 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 May 10 02:16:33.020530 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ May 10 02:16:33.020687 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 May 10 02:16:33.020864 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 May 10 02:16:33.021018 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ May 10 02:16:33.021242 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 May 10 02:16:33.021398 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 May 10 02:16:33.021552 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ May 10 02:16:33.021707 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 May 10 02:16:33.021861 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 May 10 02:16:33.022017 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ May 10 02:16:33.022084 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 10 02:16:33.022099 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 10 02:16:33.022113 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 10 02:16:33.022127 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 10 02:16:33.022140 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 10 02:16:33.022154 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 10 02:16:33.022167 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 10 02:16:33.022186 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 10 02:16:33.022358 kernel: rtc_cmos 00:03: RTC can wake from S4 May 10 02:16:33.022380 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 10 02:16:33.022523 kernel: rtc_cmos 00:03: registered as rtc0 May 10 02:16:33.022668 kernel: rtc_cmos 00:03: setting system clock to 2025-05-10T02:16:32 UTC (1746843392) May 10 02:16:33.022832 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram May 10 02:16:33.022850 kernel: intel_pstate: CPU model not supported May 10 02:16:33.022863 kernel: NET: Registered PF_INET6 protocol family May 10 02:16:33.022890 kernel: Segment Routing with IPv6 May 10 02:16:33.022904 kernel: In-situ OAM (IOAM) with IPv6 May 10 02:16:33.022917 kernel: NET: Registered PF_PACKET protocol family May 10 02:16:33.022934 kernel: Key type dns_resolver registered May 10 02:16:33.022947 kernel: IPI shorthand broadcast: enabled May 10 02:16:33.022960 kernel: sched_clock: Marking stable (1008003059, 224163706)->(1519702596, -287535831) May 10 02:16:33.022973 kernel: registered taskstats version 1 May 10 02:16:33.022986 kernel: Loading compiled-in X.509 certificates May 10 02:16:33.022999 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 0c62a22cd9157131d2e97d5a2e1bd9023e187117' May 10 02:16:33.023038 kernel: Key type .fscrypt registered May 10 02:16:33.023079 kernel: Key type fscrypt-provisioning registered May 10 02:16:33.023093 kernel: ima: No TPM chip found, activating TPM-bypass! May 10 02:16:33.023106 kernel: ima: Allocated hash algorithm: sha1 May 10 02:16:33.023120 kernel: ima: No architecture policies found May 10 02:16:33.023133 kernel: clk: Disabling unused clocks May 10 02:16:33.023146 kernel: Freeing unused kernel image (initmem) memory: 47456K May 10 02:16:33.023160 kernel: Write protecting the kernel read-only data: 28672k May 10 02:16:33.023173 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 10 02:16:33.023193 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 10 02:16:33.023206 kernel: Run /init as init process May 10 02:16:33.023219 kernel: with arguments: May 10 02:16:33.023232 kernel: /init May 10 02:16:33.023245 kernel: with environment: May 10 02:16:33.023258 kernel: HOME=/ May 10 02:16:33.023271 kernel: TERM=linux May 10 02:16:33.023284 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 10 02:16:33.023307 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 02:16:33.023331 systemd[1]: Detected virtualization kvm. May 10 02:16:33.023345 systemd[1]: Detected architecture x86-64. May 10 02:16:33.023359 systemd[1]: Running in initrd. May 10 02:16:33.023372 systemd[1]: No hostname configured, using default hostname. May 10 02:16:33.023386 systemd[1]: Hostname set to . May 10 02:16:33.023400 systemd[1]: Initializing machine ID from VM UUID. May 10 02:16:33.023413 systemd[1]: Queued start job for default target initrd.target. May 10 02:16:33.023431 systemd[1]: Started systemd-ask-password-console.path. May 10 02:16:33.023450 systemd[1]: Reached target cryptsetup.target. May 10 02:16:33.023463 systemd[1]: Reached target paths.target. May 10 02:16:33.023477 systemd[1]: Reached target slices.target. May 10 02:16:33.023490 systemd[1]: Reached target swap.target. May 10 02:16:33.023504 systemd[1]: Reached target timers.target. May 10 02:16:33.023518 systemd[1]: Listening on iscsid.socket. May 10 02:16:33.023532 systemd[1]: Listening on iscsiuio.socket. May 10 02:16:33.023551 systemd[1]: Listening on systemd-journald-audit.socket. May 10 02:16:33.023565 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 02:16:33.023579 systemd[1]: Listening on systemd-journald.socket. May 10 02:16:33.023592 systemd[1]: Listening on systemd-networkd.socket. May 10 02:16:33.023606 systemd[1]: Listening on systemd-udevd-control.socket. May 10 02:16:33.023620 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 02:16:33.023634 systemd[1]: Reached target sockets.target. May 10 02:16:33.023647 systemd[1]: Starting kmod-static-nodes.service... May 10 02:16:33.023661 systemd[1]: Finished network-cleanup.service. May 10 02:16:33.023679 systemd[1]: Starting systemd-fsck-usr.service... May 10 02:16:33.023694 systemd[1]: Starting systemd-journald.service... May 10 02:16:33.023707 systemd[1]: Starting systemd-modules-load.service... May 10 02:16:33.023722 systemd[1]: Starting systemd-resolved.service... May 10 02:16:33.023735 systemd[1]: Starting systemd-vconsole-setup.service... May 10 02:16:33.023749 systemd[1]: Finished kmod-static-nodes.service. May 10 02:16:33.023763 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 10 02:16:33.023787 systemd-journald[202]: Journal started May 10 02:16:33.023877 systemd-journald[202]: Runtime Journal (/run/log/journal/824f72ea81c04164b453b57f05bea0c5) is 4.7M, max 38.1M, 33.3M free. May 10 02:16:32.946813 systemd-modules-load[203]: Inserted module 'overlay' May 10 02:16:33.075185 kernel: Bridge firewalling registered May 10 02:16:33.075234 systemd[1]: Started systemd-resolved.service. May 10 02:16:33.075258 systemd[1]: Started systemd-journald.service. May 10 02:16:33.075277 kernel: audit: type=1130 audit(1746843393.044:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:33.075296 kernel: audit: type=1130 audit(1746843393.047:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:33.075314 kernel: SCSI subsystem initialized May 10 02:16:33.075331 kernel: audit: type=1130 audit(1746843393.060:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:33.075348 kernel: audit: type=1130 audit(1746843393.066:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:33.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:33.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:33.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:33.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:33.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:33.003094 systemd-resolved[204]: Positive Trust Anchors: May 10 02:16:33.089394 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 10 02:16:33.089422 kernel: device-mapper: uevent: version 1.0.3 May 10 02:16:33.089441 kernel: audit: type=1130 audit(1746843393.072:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:33.089459 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 10 02:16:33.003114 systemd-resolved[204]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 02:16:33.003160 systemd-resolved[204]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 02:16:33.008246 systemd-resolved[204]: Defaulting to hostname 'linux'. May 10 02:16:33.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:33.030209 systemd-modules-load[203]: Inserted module 'br_netfilter' May 10 02:16:33.113276 kernel: audit: type=1130 audit(1746843393.100:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:33.065632 systemd[1]: Finished systemd-fsck-usr.service. May 10 02:16:33.119818 kernel: audit: type=1130 audit(1746843393.113:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:33.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:33.066457 systemd[1]: Finished systemd-vconsole-setup.service. May 10 02:16:33.126118 kernel: audit: type=1130 audit(1746843393.120:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:33.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:33.072243 systemd[1]: Reached target nss-lookup.target. May 10 02:16:33.132635 kernel: audit: type=1130 audit(1746843393.126:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:33.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:33.074515 systemd[1]: Starting dracut-cmdline-ask.service... May 10 02:16:33.080262 systemd-modules-load[203]: Inserted module 'dm_multipath' May 10 02:16:33.090469 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 02:16:33.093921 systemd[1]: Finished systemd-modules-load.service. May 10 02:16:33.101651 systemd[1]: Starting systemd-sysctl.service... May 10 02:16:33.112784 systemd[1]: Finished dracut-cmdline-ask.service. May 10 02:16:33.114168 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 02:16:33.154935 dracut-cmdline[223]: dracut-dracut-053 May 10 02:16:33.120857 systemd[1]: Finished systemd-sysctl.service. May 10 02:16:33.156499 dracut-cmdline[223]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 02:16:33.128012 systemd[1]: Starting dracut-cmdline.service... May 10 02:16:33.241098 kernel: Loading iSCSI transport class v2.0-870. May 10 02:16:33.263069 kernel: iscsi: registered transport (tcp) May 10 02:16:33.293298 kernel: iscsi: registered transport (qla4xxx) May 10 02:16:33.293374 kernel: QLogic iSCSI HBA Driver May 10 02:16:33.343722 systemd[1]: Finished dracut-cmdline.service. May 10 02:16:33.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:33.345800 systemd[1]: Starting dracut-pre-udev.service... May 10 02:16:33.406115 kernel: raid6: sse2x4 gen() 13144 MB/s May 10 02:16:33.424078 kernel: raid6: sse2x4 xor() 7660 MB/s May 10 02:16:33.442109 kernel: raid6: sse2x2 gen() 9067 MB/s May 10 02:16:33.460097 kernel: raid6: sse2x2 xor() 7673 MB/s May 10 02:16:33.478100 kernel: raid6: sse2x1 gen() 9171 MB/s May 10 02:16:33.496921 kernel: raid6: sse2x1 xor() 6968 MB/s May 10 02:16:33.496990 kernel: raid6: using algorithm sse2x4 gen() 13144 MB/s May 10 02:16:33.497015 kernel: raid6: .... xor() 7660 MB/s, rmw enabled May 10 02:16:33.498213 kernel: raid6: using ssse3x2 recovery algorithm May 10 02:16:33.516083 kernel: xor: automatically using best checksumming function avx May 10 02:16:33.636387 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 10 02:16:33.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:33.651558 systemd[1]: Finished dracut-pre-udev.service. May 10 02:16:33.653000 audit: BPF prog-id=7 op=LOAD May 10 02:16:33.653000 audit: BPF prog-id=8 op=LOAD May 10 02:16:33.653932 systemd[1]: Starting systemd-udevd.service... May 10 02:16:33.671938 systemd-udevd[401]: Using default interface naming scheme 'v252'. May 10 02:16:33.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:33.682674 systemd[1]: Started systemd-udevd.service. May 10 02:16:33.684541 systemd[1]: Starting dracut-pre-trigger.service... May 10 02:16:33.706096 dracut-pre-trigger[406]: rd.md=0: removing MD RAID activation May 10 02:16:33.749865 systemd[1]: Finished dracut-pre-trigger.service. May 10 02:16:33.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:33.751666 systemd[1]: Starting systemd-udev-trigger.service... May 10 02:16:33.848269 systemd[1]: Finished systemd-udev-trigger.service. May 10 02:16:33.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:33.951207 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) May 10 02:16:34.020385 kernel: cryptd: max_cpu_qlen set to 1000 May 10 02:16:34.020412 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 10 02:16:34.020431 kernel: GPT:17805311 != 125829119 May 10 02:16:34.020449 kernel: GPT:Alternate GPT header not at the end of the disk. May 10 02:16:34.020476 kernel: GPT:17805311 != 125829119 May 10 02:16:34.020493 kernel: GPT: Use GNU Parted to correct GPT errors. May 10 02:16:34.020511 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 02:16:34.020528 kernel: ACPI: bus type USB registered May 10 02:16:34.020545 kernel: usbcore: registered new interface driver usbfs May 10 02:16:34.020561 kernel: usbcore: registered new interface driver hub May 10 02:16:34.020578 kernel: usbcore: registered new device driver usb May 10 02:16:34.020595 kernel: AVX version of gcm_enc/dec engaged. May 10 02:16:34.020612 kernel: AES CTR mode by8 optimization enabled May 10 02:16:34.023066 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller May 10 02:16:34.025786 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 May 10 02:16:34.025974 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 May 10 02:16:34.026217 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller May 10 02:16:34.026400 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 May 10 02:16:34.026574 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed May 10 02:16:34.026760 kernel: hub 1-0:1.0: USB hub found May 10 02:16:34.026973 kernel: hub 1-0:1.0: 4 ports detected May 10 02:16:34.027202 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. May 10 02:16:34.027415 kernel: hub 2-0:1.0: USB hub found May 10 02:16:34.027642 kernel: hub 2-0:1.0: 4 ports detected May 10 02:16:34.041059 kernel: libata version 3.00 loaded. May 10 02:16:34.059733 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 10 02:16:34.166537 kernel: ahci 0000:00:1f.2: version 3.0 May 10 02:16:34.166780 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 10 02:16:34.166803 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (446) May 10 02:16:34.166821 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 10 02:16:34.166994 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 10 02:16:34.167205 kernel: scsi host0: ahci May 10 02:16:34.167398 kernel: scsi host1: ahci May 10 02:16:34.167598 kernel: scsi host2: ahci May 10 02:16:34.167795 kernel: scsi host3: ahci May 10 02:16:34.167982 kernel: scsi host4: ahci May 10 02:16:34.168211 kernel: scsi host5: ahci May 10 02:16:34.168403 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 41 May 10 02:16:34.168433 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 41 May 10 02:16:34.168457 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 41 May 10 02:16:34.168475 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 41 May 10 02:16:34.168496 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 41 May 10 02:16:34.168513 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 41 May 10 02:16:34.165579 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 10 02:16:34.179199 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 10 02:16:34.184788 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 10 02:16:34.190515 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 02:16:34.192597 systemd[1]: Starting disk-uuid.service... May 10 02:16:34.204060 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 02:16:34.207154 disk-uuid[528]: Primary Header is updated. May 10 02:16:34.207154 disk-uuid[528]: Secondary Entries is updated. May 10 02:16:34.207154 disk-uuid[528]: Secondary Header is updated. May 10 02:16:34.270122 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd May 10 02:16:34.402561 kernel: ata3: SATA link down (SStatus 0 SControl 300) May 10 02:16:34.402646 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 10 02:16:34.403060 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 10 02:16:34.414966 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 10 02:16:34.415024 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 10 02:16:34.415057 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 10 02:16:34.432059 kernel: hid: raw HID events driver (C) Jiri Kosina May 10 02:16:34.438917 kernel: usbcore: registered new interface driver usbhid May 10 02:16:34.438953 kernel: usbhid: USB HID core driver May 10 02:16:34.448677 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input3 May 10 02:16:34.448724 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 May 10 02:16:35.218622 disk-uuid[529]: The operation has completed successfully. May 10 02:16:35.219640 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 02:16:35.271097 systemd[1]: disk-uuid.service: Deactivated successfully. May 10 02:16:35.272366 systemd[1]: Finished disk-uuid.service. May 10 02:16:35.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:35.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:35.287848 systemd[1]: Starting verity-setup.service... May 10 02:16:35.308060 kernel: device-mapper: verity: sha256 using implementation "sha256-avx" May 10 02:16:35.362442 systemd[1]: Found device dev-mapper-usr.device. May 10 02:16:35.364351 systemd[1]: Mounting sysusr-usr.mount... May 10 02:16:35.366247 systemd[1]: Finished verity-setup.service. May 10 02:16:35.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:35.464087 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 02:16:35.464771 systemd[1]: Mounted sysusr-usr.mount. May 10 02:16:35.465701 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 10 02:16:35.467106 systemd[1]: Starting ignition-setup.service... May 10 02:16:35.469692 systemd[1]: Starting parse-ip-for-networkd.service... May 10 02:16:35.488722 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 02:16:35.488766 kernel: BTRFS info (device vda6): using free space tree May 10 02:16:35.488785 kernel: BTRFS info (device vda6): has skinny extents May 10 02:16:35.511343 systemd[1]: mnt-oem.mount: Deactivated successfully. May 10 02:16:35.520350 systemd[1]: Finished ignition-setup.service. May 10 02:16:35.522403 systemd[1]: Starting ignition-fetch-offline.service... May 10 02:16:35.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:35.640412 systemd[1]: Finished parse-ip-for-networkd.service. May 10 02:16:35.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:35.643000 audit: BPF prog-id=9 op=LOAD May 10 02:16:35.644242 systemd[1]: Starting systemd-networkd.service... May 10 02:16:35.695181 ignition[634]: Ignition 2.14.0 May 10 02:16:35.695202 ignition[634]: Stage: fetch-offline May 10 02:16:35.695317 ignition[634]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 02:16:35.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:35.698594 systemd-networkd[710]: lo: Link UP May 10 02:16:35.695355 ignition[634]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 10 02:16:35.698603 systemd-networkd[710]: lo: Gained carrier May 10 02:16:35.697051 ignition[634]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 10 02:16:35.699750 systemd-networkd[710]: Enumeration completed May 10 02:16:35.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:35.705184 ignition[634]: parsed url from cmdline: "" May 10 02:16:35.700237 systemd-networkd[710]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 02:16:35.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:35.705192 ignition[634]: no config URL provided May 10 02:16:35.700519 systemd[1]: Started systemd-networkd.service. May 10 02:16:35.705204 ignition[634]: reading system config file "/usr/lib/ignition/user.ign" May 10 02:16:35.701618 systemd[1]: Reached target network.target. May 10 02:16:35.705221 ignition[634]: no config at "/usr/lib/ignition/user.ign" May 10 02:16:35.702541 systemd-networkd[710]: eth0: Link UP May 10 02:16:35.705255 ignition[634]: failed to fetch config: resource requires networking May 10 02:16:35.702548 systemd-networkd[710]: eth0: Gained carrier May 10 02:16:35.705453 ignition[634]: Ignition finished successfully May 10 02:16:35.703844 systemd[1]: Starting iscsiuio.service... May 10 02:16:35.707146 systemd[1]: Finished ignition-fetch-offline.service. May 10 02:16:35.724203 systemd[1]: Started iscsiuio.service. May 10 02:16:35.738321 iscsid[716]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 10 02:16:35.738321 iscsid[716]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 10 02:16:35.738321 iscsid[716]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 10 02:16:35.738321 iscsid[716]: If using hardware iscsi like qla4xxx this message can be ignored. May 10 02:16:35.738321 iscsid[716]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 10 02:16:35.738321 iscsid[716]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 10 02:16:35.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:35.726607 systemd[1]: Starting ignition-fetch.service... May 10 02:16:35.746270 ignition[715]: Ignition 2.14.0 May 10 02:16:35.728598 systemd[1]: Starting iscsid.service... May 10 02:16:35.746281 ignition[715]: Stage: fetch May 10 02:16:35.739640 systemd[1]: Started iscsid.service. May 10 02:16:35.746449 ignition[715]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 02:16:35.742129 systemd[1]: Starting dracut-initqueue.service... May 10 02:16:35.746484 ignition[715]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 10 02:16:35.751193 systemd-networkd[710]: eth0: DHCPv4 address 10.230.14.182/30, gateway 10.230.14.181 acquired from 10.230.14.181 May 10 02:16:35.748275 ignition[715]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 10 02:16:35.748421 ignition[715]: parsed url from cmdline: "" May 10 02:16:35.748429 ignition[715]: no config URL provided May 10 02:16:35.748438 ignition[715]: reading system config file "/usr/lib/ignition/user.ign" May 10 02:16:35.748458 ignition[715]: no config at "/usr/lib/ignition/user.ign" May 10 02:16:35.757023 ignition[715]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... May 10 02:16:35.771662 systemd[1]: Finished dracut-initqueue.service. May 10 02:16:35.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:35.757087 ignition[715]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... May 10 02:16:35.772690 systemd[1]: Reached target remote-fs-pre.target. May 10 02:16:35.757155 ignition[715]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 May 10 02:16:35.773766 systemd[1]: Reached target remote-cryptsetup.target. May 10 02:16:35.775110 systemd[1]: Reached target remote-fs.target. May 10 02:16:35.777884 systemd[1]: Starting dracut-pre-mount.service... May 10 02:16:35.778071 ignition[715]: GET result: OK May 10 02:16:35.778419 ignition[715]: parsing config with SHA512: 428289f9b8c31d036cc622ff7993844b000c4cdd0d818d86a1d92ce8b102748cb637ba34a35c1458ee307d9b86295f9e40ac687306a02d5449a6ee9f5db6b176 May 10 02:16:35.793117 unknown[715]: fetched base config from "system" May 10 02:16:35.793138 unknown[715]: fetched base config from "system" May 10 02:16:35.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:35.793812 ignition[715]: fetch: fetch complete May 10 02:16:35.793167 unknown[715]: fetched user config from "openstack" May 10 02:16:35.793822 ignition[715]: fetch: fetch passed May 10 02:16:35.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:35.794866 systemd[1]: Finished dracut-pre-mount.service. May 10 02:16:35.793906 ignition[715]: Ignition finished successfully May 10 02:16:35.797365 systemd[1]: Finished ignition-fetch.service. May 10 02:16:35.799800 systemd[1]: Starting ignition-kargs.service... May 10 02:16:35.812251 ignition[735]: Ignition 2.14.0 May 10 02:16:35.812270 ignition[735]: Stage: kargs May 10 02:16:35.812427 ignition[735]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 02:16:35.812462 ignition[735]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 10 02:16:35.813709 ignition[735]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 10 02:16:35.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:35.815115 ignition[735]: kargs: kargs passed May 10 02:16:35.816308 systemd[1]: Finished ignition-kargs.service. May 10 02:16:35.815182 ignition[735]: Ignition finished successfully May 10 02:16:35.818458 systemd[1]: Starting ignition-disks.service... May 10 02:16:35.829187 ignition[740]: Ignition 2.14.0 May 10 02:16:35.829207 ignition[740]: Stage: disks May 10 02:16:35.829379 ignition[740]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 02:16:35.829415 ignition[740]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 10 02:16:35.830713 ignition[740]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 10 02:16:35.832043 ignition[740]: disks: disks passed May 10 02:16:35.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:35.833232 systemd[1]: Finished ignition-disks.service. May 10 02:16:35.832124 ignition[740]: Ignition finished successfully May 10 02:16:35.834281 systemd[1]: Reached target initrd-root-device.target. May 10 02:16:35.835371 systemd[1]: Reached target local-fs-pre.target. May 10 02:16:35.836634 systemd[1]: Reached target local-fs.target. May 10 02:16:35.837878 systemd[1]: Reached target sysinit.target. May 10 02:16:35.839324 systemd[1]: Reached target basic.target. May 10 02:16:35.841764 systemd[1]: Starting systemd-fsck-root.service... May 10 02:16:35.863116 systemd-fsck[747]: ROOT: clean, 623/1628000 files, 124060/1617920 blocks May 10 02:16:35.868200 systemd[1]: Finished systemd-fsck-root.service. May 10 02:16:35.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:35.870110 systemd[1]: Mounting sysroot.mount... May 10 02:16:35.883072 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 02:16:35.883550 systemd[1]: Mounted sysroot.mount. May 10 02:16:35.884399 systemd[1]: Reached target initrd-root-fs.target. May 10 02:16:35.887165 systemd[1]: Mounting sysroot-usr.mount... May 10 02:16:35.888404 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 10 02:16:35.889994 systemd[1]: Starting flatcar-openstack-hostname.service... May 10 02:16:35.890783 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 10 02:16:35.890835 systemd[1]: Reached target ignition-diskful.target. May 10 02:16:35.897602 systemd[1]: Mounted sysroot-usr.mount. May 10 02:16:35.901756 systemd[1]: Starting initrd-setup-root.service... May 10 02:16:35.915723 initrd-setup-root[758]: cut: /sysroot/etc/passwd: No such file or directory May 10 02:16:35.925179 initrd-setup-root[766]: cut: /sysroot/etc/group: No such file or directory May 10 02:16:35.936735 initrd-setup-root[774]: cut: /sysroot/etc/shadow: No such file or directory May 10 02:16:35.945824 initrd-setup-root[783]: cut: /sysroot/etc/gshadow: No such file or directory May 10 02:16:36.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:36.022499 systemd[1]: Finished initrd-setup-root.service. May 10 02:16:36.024900 systemd[1]: Starting ignition-mount.service... May 10 02:16:36.031401 systemd[1]: Starting sysroot-boot.service... May 10 02:16:36.040054 bash[801]: umount: /sysroot/usr/share/oem: not mounted. May 10 02:16:36.046531 coreos-metadata[753]: May 10 02:16:36.046 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 May 10 02:16:36.059026 ignition[802]: INFO : Ignition 2.14.0 May 10 02:16:36.060171 ignition[802]: INFO : Stage: mount May 10 02:16:36.061100 ignition[802]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 02:16:36.062167 ignition[802]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 10 02:16:36.064710 coreos-metadata[753]: May 10 02:16:36.064 INFO Fetch successful May 10 02:16:36.065609 coreos-metadata[753]: May 10 02:16:36.065 INFO wrote hostname srv-slver.gb1.brightbox.com to /sysroot/etc/hostname May 10 02:16:36.067364 ignition[802]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 10 02:16:36.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:36.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:36.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:36.068878 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. May 10 02:16:36.072001 ignition[802]: INFO : mount: mount passed May 10 02:16:36.072001 ignition[802]: INFO : Ignition finished successfully May 10 02:16:36.069102 systemd[1]: Finished flatcar-openstack-hostname.service. May 10 02:16:36.070170 systemd[1]: Finished sysroot-boot.service. May 10 02:16:36.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:36.073431 systemd[1]: Finished ignition-mount.service. May 10 02:16:36.387081 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 02:16:36.405080 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (810) May 10 02:16:36.408061 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 02:16:36.408096 kernel: BTRFS info (device vda6): using free space tree May 10 02:16:36.408115 kernel: BTRFS info (device vda6): has skinny extents May 10 02:16:36.414332 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 02:16:36.416105 systemd[1]: Starting ignition-files.service... May 10 02:16:36.439921 ignition[830]: INFO : Ignition 2.14.0 May 10 02:16:36.441083 ignition[830]: INFO : Stage: files May 10 02:16:36.442082 ignition[830]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 02:16:36.443008 ignition[830]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 10 02:16:36.444380 ignition[830]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 10 02:16:36.446309 ignition[830]: DEBUG : files: compiled without relabeling support, skipping May 10 02:16:36.447606 ignition[830]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 10 02:16:36.447606 ignition[830]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 10 02:16:36.452446 ignition[830]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 10 02:16:36.452446 ignition[830]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 10 02:16:36.454666 ignition[830]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 10 02:16:36.454303 unknown[830]: wrote ssh authorized keys file for user: core May 10 02:16:36.456612 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar-cgroupv1" May 10 02:16:36.456612 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar-cgroupv1" May 10 02:16:36.456612 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 10 02:16:36.456612 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 10 02:16:36.456612 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/flatcar/update.conf" May 10 02:16:36.456612 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 10 02:16:36.456612 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 02:16:36.456612 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 02:16:36.456612 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 02:16:36.456612 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 May 10 02:16:37.056533 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK May 10 02:16:37.058244 systemd-networkd[710]: eth0: Gained IPv6LL May 10 02:16:38.383457 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 02:16:38.383457 ignition[830]: INFO : files: op(8): [started] processing unit "coreos-metadata-sshkeys@.service" May 10 02:16:38.391454 ignition[830]: INFO : files: op(8): [finished] processing unit "coreos-metadata-sshkeys@.service" May 10 02:16:38.391454 ignition[830]: INFO : files: op(9): [started] processing unit "containerd.service" May 10 02:16:38.391454 ignition[830]: INFO : files: op(9): op(a): [started] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" May 10 02:16:38.391454 ignition[830]: INFO : files: op(9): op(a): [finished] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" May 10 02:16:38.391454 ignition[830]: INFO : files: op(9): [finished] processing unit "containerd.service" May 10 02:16:38.391454 ignition[830]: INFO : files: op(b): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 02:16:38.391454 ignition[830]: INFO : files: op(b): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 02:16:38.399069 ignition[830]: INFO : files: createResultFile: createFiles: op(c): [started] writing file "/sysroot/etc/.ignition-result.json" May 10 02:16:38.399069 ignition[830]: INFO : files: createResultFile: createFiles: op(c): [finished] writing file "/sysroot/etc/.ignition-result.json" May 10 02:16:38.399069 ignition[830]: INFO : files: files passed May 10 02:16:38.399069 ignition[830]: INFO : Ignition finished successfully May 10 02:16:38.411520 kernel: kauditd_printk_skb: 28 callbacks suppressed May 10 02:16:38.411922 kernel: audit: type=1130 audit(1746843398.401:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.400745 systemd[1]: Finished ignition-files.service. May 10 02:16:38.403450 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 10 02:16:38.410859 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 10 02:16:38.436550 kernel: audit: type=1130 audit(1746843398.419:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.436591 kernel: audit: type=1131 audit(1746843398.419:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.436611 kernel: audit: type=1130 audit(1746843398.420:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.412810 systemd[1]: Starting ignition-quench.service... May 10 02:16:38.437821 initrd-setup-root-after-ignition[855]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 10 02:16:38.417398 systemd[1]: ignition-quench.service: Deactivated successfully. May 10 02:16:38.417540 systemd[1]: Finished ignition-quench.service. May 10 02:16:38.419849 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 10 02:16:38.420698 systemd[1]: Reached target ignition-complete.target. May 10 02:16:38.438131 systemd[1]: Starting initrd-parse-etc.service... May 10 02:16:38.457110 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 10 02:16:38.457268 systemd[1]: Finished initrd-parse-etc.service. May 10 02:16:38.469259 kernel: audit: type=1130 audit(1746843398.458:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.469290 kernel: audit: type=1131 audit(1746843398.458:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.458921 systemd[1]: Reached target initrd-fs.target. May 10 02:16:38.469883 systemd[1]: Reached target initrd.target. May 10 02:16:38.471199 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 10 02:16:38.472343 systemd[1]: Starting dracut-pre-pivot.service... May 10 02:16:38.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.488677 systemd[1]: Finished dracut-pre-pivot.service. May 10 02:16:38.490372 systemd[1]: Starting initrd-cleanup.service... May 10 02:16:38.497760 kernel: audit: type=1130 audit(1746843398.489:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.503613 systemd[1]: Stopped target nss-lookup.target. May 10 02:16:38.504443 systemd[1]: Stopped target remote-cryptsetup.target. May 10 02:16:38.505753 systemd[1]: Stopped target timers.target. May 10 02:16:38.507015 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 10 02:16:38.513953 kernel: audit: type=1131 audit(1746843398.508:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.507196 systemd[1]: Stopped dracut-pre-pivot.service. May 10 02:16:38.508438 systemd[1]: Stopped target initrd.target. May 10 02:16:38.514650 systemd[1]: Stopped target basic.target. May 10 02:16:38.515974 systemd[1]: Stopped target ignition-complete.target. May 10 02:16:38.517285 systemd[1]: Stopped target ignition-diskful.target. May 10 02:16:38.518592 systemd[1]: Stopped target initrd-root-device.target. May 10 02:16:38.520081 systemd[1]: Stopped target remote-fs.target. May 10 02:16:38.521479 systemd[1]: Stopped target remote-fs-pre.target. May 10 02:16:38.522755 systemd[1]: Stopped target sysinit.target. May 10 02:16:38.524049 systemd[1]: Stopped target local-fs.target. May 10 02:16:38.525413 systemd[1]: Stopped target local-fs-pre.target. May 10 02:16:38.526736 systemd[1]: Stopped target swap.target. May 10 02:16:38.549182 kernel: audit: type=1131 audit(1746843398.543:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.542092 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 10 02:16:38.542257 systemd[1]: Stopped dracut-pre-mount.service. May 10 02:16:38.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.543690 systemd[1]: Stopped target cryptsetup.target. May 10 02:16:38.557601 kernel: audit: type=1131 audit(1746843398.551:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.549808 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 10 02:16:38.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.549997 systemd[1]: Stopped dracut-initqueue.service. May 10 02:16:38.551504 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 10 02:16:38.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.551750 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 10 02:16:38.558561 systemd[1]: ignition-files.service: Deactivated successfully. May 10 02:16:38.558701 systemd[1]: Stopped ignition-files.service. May 10 02:16:38.561350 systemd[1]: Stopping ignition-mount.service... May 10 02:16:38.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.563437 systemd[1]: Stopping sysroot-boot.service... May 10 02:16:38.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.569214 systemd-networkd[710]: eth0: Ignoring DHCPv6 address 2a02:1348:179:83ad:24:19ff:fee6:eb6/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:179:83ad:24:19ff:fee6:eb6/64 assigned by NDisc. May 10 02:16:38.569220 systemd-networkd[710]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. May 10 02:16:38.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.570964 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 10 02:16:38.571241 systemd[1]: Stopped systemd-udev-trigger.service. May 10 02:16:38.586995 ignition[868]: INFO : Ignition 2.14.0 May 10 02:16:38.586995 ignition[868]: INFO : Stage: umount May 10 02:16:38.586995 ignition[868]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 02:16:38.586995 ignition[868]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 10 02:16:38.586995 ignition[868]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 10 02:16:38.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.576556 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 10 02:16:38.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.594800 ignition[868]: INFO : umount: umount passed May 10 02:16:38.594800 ignition[868]: INFO : Ignition finished successfully May 10 02:16:38.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.576718 systemd[1]: Stopped dracut-pre-trigger.service. May 10 02:16:38.581241 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 10 02:16:38.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.581389 systemd[1]: Finished initrd-cleanup.service. May 10 02:16:38.591399 systemd[1]: ignition-mount.service: Deactivated successfully. May 10 02:16:38.591527 systemd[1]: Stopped ignition-mount.service. May 10 02:16:38.592608 systemd[1]: ignition-disks.service: Deactivated successfully. May 10 02:16:38.592674 systemd[1]: Stopped ignition-disks.service. May 10 02:16:38.594097 systemd[1]: ignition-kargs.service: Deactivated successfully. May 10 02:16:38.594157 systemd[1]: Stopped ignition-kargs.service. May 10 02:16:38.595449 systemd[1]: ignition-fetch.service: Deactivated successfully. May 10 02:16:38.595507 systemd[1]: Stopped ignition-fetch.service. May 10 02:16:38.596691 systemd[1]: Stopped target network.target. May 10 02:16:38.597967 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 10 02:16:38.598030 systemd[1]: Stopped ignition-fetch-offline.service. May 10 02:16:38.599285 systemd[1]: Stopped target paths.target. May 10 02:16:38.599876 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 10 02:16:38.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.606113 systemd[1]: Stopped systemd-ask-password-console.path. May 10 02:16:38.608354 systemd[1]: Stopped target slices.target. May 10 02:16:38.609528 systemd[1]: Stopped target sockets.target. May 10 02:16:38.610794 systemd[1]: iscsid.socket: Deactivated successfully. May 10 02:16:38.610841 systemd[1]: Closed iscsid.socket. May 10 02:16:38.613020 systemd[1]: iscsiuio.socket: Deactivated successfully. May 10 02:16:38.613084 systemd[1]: Closed iscsiuio.socket. May 10 02:16:38.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.614289 systemd[1]: ignition-setup.service: Deactivated successfully. May 10 02:16:38.614353 systemd[1]: Stopped ignition-setup.service. May 10 02:16:38.615674 systemd[1]: Stopping systemd-networkd.service... May 10 02:16:38.617823 systemd[1]: Stopping systemd-resolved.service... May 10 02:16:38.620558 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 10 02:16:38.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.621092 systemd-networkd[710]: eth0: DHCPv6 lease lost May 10 02:16:38.634000 audit: BPF prog-id=9 op=UNLOAD May 10 02:16:38.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.622641 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 02:16:38.622778 systemd[1]: Stopped systemd-networkd.service. May 10 02:16:38.624882 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 10 02:16:38.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.624947 systemd[1]: Closed systemd-networkd.socket. May 10 02:16:38.628744 systemd[1]: Stopping network-cleanup.service... May 10 02:16:38.632169 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 10 02:16:38.632246 systemd[1]: Stopped parse-ip-for-networkd.service. May 10 02:16:38.647000 audit: BPF prog-id=6 op=UNLOAD May 10 02:16:38.632981 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 10 02:16:38.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.633067 systemd[1]: Stopped systemd-sysctl.service. May 10 02:16:38.634171 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 10 02:16:38.634233 systemd[1]: Stopped systemd-modules-load.service. May 10 02:16:38.637953 systemd[1]: Stopping systemd-udevd.service... May 10 02:16:38.640838 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 10 02:16:38.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.641644 systemd[1]: systemd-resolved.service: Deactivated successfully. May 10 02:16:38.641781 systemd[1]: Stopped systemd-resolved.service. May 10 02:16:38.647165 systemd[1]: network-cleanup.service: Deactivated successfully. May 10 02:16:38.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.647297 systemd[1]: Stopped network-cleanup.service. May 10 02:16:38.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.651531 systemd[1]: systemd-udevd.service: Deactivated successfully. May 10 02:16:38.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.651718 systemd[1]: Stopped systemd-udevd.service. May 10 02:16:38.654218 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 10 02:16:38.654280 systemd[1]: Closed systemd-udevd-control.socket. May 10 02:16:38.655425 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 10 02:16:38.655476 systemd[1]: Closed systemd-udevd-kernel.socket. May 10 02:16:38.657343 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 10 02:16:38.657413 systemd[1]: Stopped dracut-pre-udev.service. May 10 02:16:38.658595 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 10 02:16:38.658667 systemd[1]: Stopped dracut-cmdline.service. May 10 02:16:38.659938 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 10 02:16:38.659998 systemd[1]: Stopped dracut-cmdline-ask.service. May 10 02:16:38.662294 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 10 02:16:38.671376 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 10 02:16:38.671474 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 10 02:16:38.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.674307 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 10 02:16:38.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.674375 systemd[1]: Stopped kmod-static-nodes.service. May 10 02:16:38.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.675227 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 10 02:16:38.675290 systemd[1]: Stopped systemd-vconsole-setup.service. May 10 02:16:38.677998 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 10 02:16:38.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.678676 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 10 02:16:38.678812 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 10 02:16:38.727733 systemd[1]: sysroot-boot.service: Deactivated successfully. May 10 02:16:38.727987 systemd[1]: Stopped sysroot-boot.service. May 10 02:16:38.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.729569 systemd[1]: Reached target initrd-switch-root.target. May 10 02:16:38.730627 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 10 02:16:38.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:38.730700 systemd[1]: Stopped initrd-setup-root.service. May 10 02:16:38.733169 systemd[1]: Starting initrd-switch-root.service... May 10 02:16:38.744931 systemd[1]: Switching root. May 10 02:16:38.748000 audit: BPF prog-id=8 op=UNLOAD May 10 02:16:38.748000 audit: BPF prog-id=7 op=UNLOAD May 10 02:16:38.751000 audit: BPF prog-id=5 op=UNLOAD May 10 02:16:38.751000 audit: BPF prog-id=4 op=UNLOAD May 10 02:16:38.751000 audit: BPF prog-id=3 op=UNLOAD May 10 02:16:38.770811 systemd-journald[202]: Journal stopped May 10 02:16:42.920208 systemd-journald[202]: Received SIGTERM from PID 1 (systemd). May 10 02:16:42.920414 kernel: SELinux: Class mctp_socket not defined in policy. May 10 02:16:42.920466 kernel: SELinux: Class anon_inode not defined in policy. May 10 02:16:42.920507 kernel: SELinux: the above unknown classes and permissions will be allowed May 10 02:16:42.920536 kernel: SELinux: policy capability network_peer_controls=1 May 10 02:16:42.920611 kernel: SELinux: policy capability open_perms=1 May 10 02:16:42.920655 kernel: SELinux: policy capability extended_socket_class=1 May 10 02:16:42.920683 kernel: SELinux: policy capability always_check_network=0 May 10 02:16:42.920718 kernel: SELinux: policy capability cgroup_seclabel=1 May 10 02:16:42.920746 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 10 02:16:42.920807 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 10 02:16:42.920830 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 10 02:16:42.920865 systemd[1]: Successfully loaded SELinux policy in 73.897ms. May 10 02:16:42.920920 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 16.331ms. May 10 02:16:42.920953 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 02:16:42.920979 systemd[1]: Detected virtualization kvm. May 10 02:16:42.921017 systemd[1]: Detected architecture x86-64. May 10 02:16:42.921495 systemd[1]: Detected first boot. May 10 02:16:42.921554 systemd[1]: Hostname set to . May 10 02:16:42.921586 systemd[1]: Initializing machine ID from VM UUID. May 10 02:16:42.921615 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 10 02:16:42.921645 systemd[1]: Populated /etc with preset unit settings. May 10 02:16:42.921675 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 02:16:42.921707 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 02:16:42.921795 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 02:16:42.921840 systemd[1]: Queued start job for default target multi-user.target. May 10 02:16:42.921864 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 10 02:16:42.921894 systemd[1]: Created slice system-addon\x2dconfig.slice. May 10 02:16:42.921918 systemd[1]: Created slice system-addon\x2drun.slice. May 10 02:16:42.921942 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 10 02:16:42.921978 systemd[1]: Created slice system-getty.slice. May 10 02:16:42.922007 systemd[1]: Created slice system-modprobe.slice. May 10 02:16:42.935889 systemd[1]: Created slice system-serial\x2dgetty.slice. May 10 02:16:42.935947 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 10 02:16:42.935983 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 10 02:16:42.936007 systemd[1]: Created slice user.slice. May 10 02:16:42.936068 systemd[1]: Started systemd-ask-password-console.path. May 10 02:16:42.936147 systemd[1]: Started systemd-ask-password-wall.path. May 10 02:16:42.936178 systemd[1]: Set up automount boot.automount. May 10 02:16:42.936210 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 10 02:16:42.936241 systemd[1]: Reached target integritysetup.target. May 10 02:16:42.936264 systemd[1]: Reached target remote-cryptsetup.target. May 10 02:16:42.936293 systemd[1]: Reached target remote-fs.target. May 10 02:16:42.936337 systemd[1]: Reached target slices.target. May 10 02:16:42.936399 systemd[1]: Reached target swap.target. May 10 02:16:42.936423 systemd[1]: Reached target torcx.target. May 10 02:16:42.936453 systemd[1]: Reached target veritysetup.target. May 10 02:16:42.936482 systemd[1]: Listening on systemd-coredump.socket. May 10 02:16:42.936506 systemd[1]: Listening on systemd-initctl.socket. May 10 02:16:42.936527 systemd[1]: Listening on systemd-journald-audit.socket. May 10 02:16:42.936561 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 02:16:42.936584 systemd[1]: Listening on systemd-journald.socket. May 10 02:16:42.936624 systemd[1]: Listening on systemd-networkd.socket. May 10 02:16:42.936648 systemd[1]: Listening on systemd-udevd-control.socket. May 10 02:16:42.936697 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 02:16:42.936726 systemd[1]: Listening on systemd-userdbd.socket. May 10 02:16:42.936748 systemd[1]: Mounting dev-hugepages.mount... May 10 02:16:42.936770 systemd[1]: Mounting dev-mqueue.mount... May 10 02:16:42.936838 systemd[1]: Mounting media.mount... May 10 02:16:42.936864 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 02:16:42.936894 systemd[1]: Mounting sys-kernel-debug.mount... May 10 02:16:42.936923 systemd[1]: Mounting sys-kernel-tracing.mount... May 10 02:16:42.936960 systemd[1]: Mounting tmp.mount... May 10 02:16:42.936984 systemd[1]: Starting flatcar-tmpfiles.service... May 10 02:16:42.941064 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 02:16:42.941147 systemd[1]: Starting kmod-static-nodes.service... May 10 02:16:42.941180 systemd[1]: Starting modprobe@configfs.service... May 10 02:16:42.941220 systemd[1]: Starting modprobe@dm_mod.service... May 10 02:16:42.941245 systemd[1]: Starting modprobe@drm.service... May 10 02:16:42.941321 systemd[1]: Starting modprobe@efi_pstore.service... May 10 02:16:42.941348 systemd[1]: Starting modprobe@fuse.service... May 10 02:16:42.941394 systemd[1]: Starting modprobe@loop.service... May 10 02:16:42.941426 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 02:16:42.941456 systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling. May 10 02:16:42.941480 systemd[1]: (This warning is only shown for the first unit using IP firewalling.) May 10 02:16:42.941503 systemd[1]: Starting systemd-journald.service... May 10 02:16:42.941540 systemd[1]: Starting systemd-modules-load.service... May 10 02:16:42.942960 systemd[1]: Starting systemd-network-generator.service... May 10 02:16:42.942992 systemd[1]: Starting systemd-remount-fs.service... May 10 02:16:42.943104 systemd[1]: Starting systemd-udev-trigger.service... May 10 02:16:42.943153 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 02:16:42.943189 systemd[1]: Mounted dev-hugepages.mount. May 10 02:16:42.943218 systemd[1]: Mounted dev-mqueue.mount. May 10 02:16:42.943278 systemd[1]: Mounted media.mount. May 10 02:16:42.943319 systemd[1]: Mounted sys-kernel-debug.mount. May 10 02:16:42.943828 systemd[1]: Mounted sys-kernel-tracing.mount. May 10 02:16:42.943866 systemd[1]: Mounted tmp.mount. May 10 02:16:42.943891 systemd[1]: Finished kmod-static-nodes.service. May 10 02:16:42.943924 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 10 02:16:42.943966 systemd[1]: Finished modprobe@configfs.service. May 10 02:16:42.944165 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 02:16:42.944203 systemd[1]: Finished modprobe@dm_mod.service. May 10 02:16:42.944226 kernel: loop: module loaded May 10 02:16:42.944248 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 02:16:42.944303 systemd[1]: Finished modprobe@drm.service. May 10 02:16:42.944512 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 02:16:42.944539 kernel: fuse: init (API version 7.34) May 10 02:16:42.944560 systemd[1]: Finished modprobe@efi_pstore.service. May 10 02:16:42.945558 systemd-journald[1010]: Journal started May 10 02:16:42.945688 systemd-journald[1010]: Runtime Journal (/run/log/journal/824f72ea81c04164b453b57f05bea0c5) is 4.7M, max 38.1M, 33.3M free. May 10 02:16:42.695000 audit[1]: AVC avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 02:16:42.695000 audit[1]: EVENT_LISTENER pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 May 10 02:16:42.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:42.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:42.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:42.913000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 10 02:16:42.913000 audit[1010]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffdbe6f3fd0 a2=4000 a3=7ffdbe6f406c items=0 ppid=1 pid=1010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:16:42.913000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 10 02:16:42.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:42.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:42.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:42.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:42.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:42.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:42.950072 systemd[1]: Started systemd-journald.service. May 10 02:16:42.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:42.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:42.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:42.955280 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 10 02:16:42.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:42.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:42.955607 systemd[1]: Finished modprobe@fuse.service. May 10 02:16:42.956763 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 02:16:42.957082 systemd[1]: Finished modprobe@loop.service. May 10 02:16:42.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:42.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:42.958312 systemd[1]: Finished systemd-modules-load.service. May 10 02:16:42.959653 systemd[1]: Finished systemd-network-generator.service. May 10 02:16:42.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:42.961369 systemd[1]: Finished systemd-remount-fs.service. May 10 02:16:42.965154 systemd[1]: Reached target network-pre.target. May 10 02:16:42.972798 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 10 02:16:42.975367 systemd[1]: Mounting sys-kernel-config.mount... May 10 02:16:42.976511 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 02:16:42.982455 systemd[1]: Starting systemd-hwdb-update.service... May 10 02:16:42.989481 systemd[1]: Starting systemd-journal-flush.service... May 10 02:16:42.990318 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 02:16:42.992509 systemd[1]: Starting systemd-random-seed.service... May 10 02:16:42.997968 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 02:16:43.000351 systemd[1]: Starting systemd-sysctl.service... May 10 02:16:43.007056 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 10 02:16:43.007926 systemd[1]: Mounted sys-kernel-config.mount. May 10 02:16:43.013956 systemd-journald[1010]: Time spent on flushing to /var/log/journal/824f72ea81c04164b453b57f05bea0c5 is 83.232ms for 1204 entries. May 10 02:16:43.013956 systemd-journald[1010]: System Journal (/var/log/journal/824f72ea81c04164b453b57f05bea0c5) is 8.0M, max 584.8M, 576.8M free. May 10 02:16:43.112380 systemd-journald[1010]: Received client request to flush runtime journal. May 10 02:16:43.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:43.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:43.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:43.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:43.016622 systemd[1]: Finished systemd-random-seed.service. May 10 02:16:43.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:43.017500 systemd[1]: Reached target first-boot-complete.target. May 10 02:16:43.053953 systemd[1]: Finished systemd-sysctl.service. May 10 02:16:43.065856 systemd[1]: Finished flatcar-tmpfiles.service. May 10 02:16:43.068987 systemd[1]: Starting systemd-sysusers.service... May 10 02:16:43.108719 systemd[1]: Finished systemd-sysusers.service. May 10 02:16:43.111700 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 02:16:43.118891 systemd[1]: Finished systemd-journal-flush.service. May 10 02:16:43.168203 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 02:16:43.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:43.203509 systemd[1]: Finished systemd-udev-trigger.service. May 10 02:16:43.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:43.206713 systemd[1]: Starting systemd-udev-settle.service... May 10 02:16:43.224369 udevadm[1064]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 10 02:16:43.789373 systemd[1]: Finished systemd-hwdb-update.service. May 10 02:16:43.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:43.793214 kernel: kauditd_printk_skb: 76 callbacks suppressed May 10 02:16:43.793318 kernel: audit: type=1130 audit(1746843403.791:116): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:43.799816 systemd[1]: Starting systemd-udevd.service... May 10 02:16:43.828592 systemd-udevd[1066]: Using default interface naming scheme 'v252'. May 10 02:16:43.861110 systemd[1]: Started systemd-udevd.service. May 10 02:16:43.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:43.867736 systemd[1]: Starting systemd-networkd.service... May 10 02:16:43.871649 kernel: audit: type=1130 audit(1746843403.865:117): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:43.881672 systemd[1]: Starting systemd-userdbd.service... May 10 02:16:43.946672 systemd[1]: Found device dev-ttyS0.device. May 10 02:16:43.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:43.960578 systemd[1]: Started systemd-userdbd.service. May 10 02:16:43.967169 kernel: audit: type=1130 audit(1746843403.961:118): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:44.037472 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 02:16:44.094367 kernel: mousedev: PS/2 mouse device common for all mice May 10 02:16:44.122633 systemd-networkd[1075]: lo: Link UP May 10 02:16:44.122660 systemd-networkd[1075]: lo: Gained carrier May 10 02:16:44.123639 systemd-networkd[1075]: Enumeration completed May 10 02:16:44.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:44.123834 systemd-networkd[1075]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 02:16:44.123844 systemd[1]: Started systemd-networkd.service. May 10 02:16:44.131068 kernel: audit: type=1130 audit(1746843404.124:119): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:44.134280 systemd-networkd[1075]: eth0: Link UP May 10 02:16:44.134295 systemd-networkd[1075]: eth0: Gained carrier May 10 02:16:44.143070 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input4 May 10 02:16:44.149083 kernel: ACPI: button: Power Button [PWRF] May 10 02:16:44.157305 systemd-networkd[1075]: eth0: DHCPv4 address 10.230.14.182/30, gateway 10.230.14.181 acquired from 10.230.14.181 May 10 02:16:44.169000 audit[1068]: AVC avc: denied { confidentiality } for pid=1068 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 02:16:44.197074 kernel: audit: type=1400 audit(1746843404.169:120): avc: denied { confidentiality } for pid=1068 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 02:16:44.169000 audit[1068]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561f6289c950 a1=338ac a2=7fef86075bc5 a3=5 items=110 ppid=1066 pid=1068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:16:44.212097 kernel: audit: type=1300 audit(1746843404.169:120): arch=c000003e syscall=175 success=yes exit=0 a0=561f6289c950 a1=338ac a2=7fef86075bc5 a3=5 items=110 ppid=1066 pid=1068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:16:44.169000 audit: CWD cwd="/" May 10 02:16:44.169000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.220889 kernel: audit: type=1307 audit(1746843404.169:120): cwd="/" May 10 02:16:44.220950 kernel: audit: type=1302 audit(1746843404.169:120): item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=1 name=(null) inode=15764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=2 name=(null) inode=15764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.241496 kernel: audit: type=1302 audit(1746843404.169:120): item=1 name=(null) inode=15764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.241587 kernel: audit: type=1302 audit(1746843404.169:120): item=2 name=(null) inode=15764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.241641 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input5 May 10 02:16:44.169000 audit: PATH item=3 name=(null) inode=15765 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=4 name=(null) inode=15764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=5 name=(null) inode=15766 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=6 name=(null) inode=15764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=7 name=(null) inode=15767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=8 name=(null) inode=15767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=9 name=(null) inode=15768 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=10 name=(null) inode=15767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=11 name=(null) inode=15769 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=12 name=(null) inode=15767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=13 name=(null) inode=15770 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=14 name=(null) inode=15767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=15 name=(null) inode=15771 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=16 name=(null) inode=15767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=17 name=(null) inode=15772 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=18 name=(null) inode=15764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=19 name=(null) inode=15773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=20 name=(null) inode=15773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=21 name=(null) inode=15774 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=22 name=(null) inode=15773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=23 name=(null) inode=15775 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=24 name=(null) inode=15773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=25 name=(null) inode=15776 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=26 name=(null) inode=15773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=27 name=(null) inode=15777 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=28 name=(null) inode=15773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=29 name=(null) inode=15778 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=30 name=(null) inode=15764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=31 name=(null) inode=15779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=32 name=(null) inode=15779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=33 name=(null) inode=15780 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=34 name=(null) inode=15779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=35 name=(null) inode=15781 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=36 name=(null) inode=15779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=37 name=(null) inode=15782 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=38 name=(null) inode=15779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=39 name=(null) inode=15783 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=40 name=(null) inode=15779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=41 name=(null) inode=15784 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=42 name=(null) inode=15764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=43 name=(null) inode=15785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=44 name=(null) inode=15785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=45 name=(null) inode=15786 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=46 name=(null) inode=15785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=47 name=(null) inode=15787 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=48 name=(null) inode=15785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=49 name=(null) inode=15788 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=50 name=(null) inode=15785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=51 name=(null) inode=15789 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=52 name=(null) inode=15785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=53 name=(null) inode=15790 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=55 name=(null) inode=15791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=56 name=(null) inode=15791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=57 name=(null) inode=15792 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=58 name=(null) inode=15791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=59 name=(null) inode=15793 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=60 name=(null) inode=15791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=61 name=(null) inode=15794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=62 name=(null) inode=15794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=63 name=(null) inode=15795 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=64 name=(null) inode=15794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=65 name=(null) inode=15796 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=66 name=(null) inode=15794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=67 name=(null) inode=15797 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=68 name=(null) inode=15794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=69 name=(null) inode=15798 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=70 name=(null) inode=15794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=71 name=(null) inode=15799 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=72 name=(null) inode=15791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=73 name=(null) inode=15800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=74 name=(null) inode=15800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=75 name=(null) inode=15801 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=76 name=(null) inode=15800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=77 name=(null) inode=15802 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=78 name=(null) inode=15800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=79 name=(null) inode=15803 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=80 name=(null) inode=15800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=81 name=(null) inode=15804 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=82 name=(null) inode=15800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=83 name=(null) inode=15805 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=84 name=(null) inode=15791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=85 name=(null) inode=15806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=86 name=(null) inode=15806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=87 name=(null) inode=15807 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=88 name=(null) inode=15806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=89 name=(null) inode=15808 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=90 name=(null) inode=15806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=91 name=(null) inode=15809 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=92 name=(null) inode=15806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=93 name=(null) inode=15810 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=94 name=(null) inode=15806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=95 name=(null) inode=15811 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=96 name=(null) inode=15791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=97 name=(null) inode=15812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=98 name=(null) inode=15812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=99 name=(null) inode=15813 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=100 name=(null) inode=15812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=101 name=(null) inode=15814 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=102 name=(null) inode=15812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=103 name=(null) inode=15815 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=104 name=(null) inode=15812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=105 name=(null) inode=15816 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=106 name=(null) inode=15812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=107 name=(null) inode=15817 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PATH item=109 name=(null) inode=15818 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:16:44.169000 audit: PROCTITLE proctitle="(udev-worker)" May 10 02:16:44.279070 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 10 02:16:44.288593 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 10 02:16:44.288926 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 10 02:16:44.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:44.431870 systemd[1]: Finished systemd-udev-settle.service. May 10 02:16:44.434897 systemd[1]: Starting lvm2-activation-early.service... May 10 02:16:44.460973 lvm[1096]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 02:16:44.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:44.493075 systemd[1]: Finished lvm2-activation-early.service. May 10 02:16:44.494076 systemd[1]: Reached target cryptsetup.target. May 10 02:16:44.496932 systemd[1]: Starting lvm2-activation.service... May 10 02:16:44.504866 lvm[1098]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 02:16:44.542055 systemd[1]: Finished lvm2-activation.service. May 10 02:16:44.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:44.543069 systemd[1]: Reached target local-fs-pre.target. May 10 02:16:44.543830 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 10 02:16:44.543877 systemd[1]: Reached target local-fs.target. May 10 02:16:44.544505 systemd[1]: Reached target machines.target. May 10 02:16:44.547445 systemd[1]: Starting ldconfig.service... May 10 02:16:44.549165 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 02:16:44.549262 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 02:16:44.551403 systemd[1]: Starting systemd-boot-update.service... May 10 02:16:44.554398 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 10 02:16:44.558364 systemd[1]: Starting systemd-machine-id-commit.service... May 10 02:16:44.562666 systemd[1]: Starting systemd-sysext.service... May 10 02:16:44.574624 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1101 (bootctl) May 10 02:16:44.576308 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 10 02:16:44.584783 systemd[1]: Unmounting usr-share-oem.mount... May 10 02:16:44.590327 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 10 02:16:44.590691 systemd[1]: Unmounted usr-share-oem.mount. May 10 02:16:44.714450 kernel: loop0: detected capacity change from 0 to 210664 May 10 02:16:44.724358 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 10 02:16:44.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:44.730168 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 10 02:16:44.732626 systemd[1]: Finished systemd-machine-id-commit.service. May 10 02:16:44.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:44.753071 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 10 02:16:44.772063 kernel: loop1: detected capacity change from 0 to 210664 May 10 02:16:44.790626 (sd-sysext)[1118]: Using extensions 'kubernetes'. May 10 02:16:44.793180 (sd-sysext)[1118]: Merged extensions into '/usr'. May 10 02:16:44.830350 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 02:16:44.833416 systemd[1]: Mounting usr-share-oem.mount... May 10 02:16:44.839355 systemd-fsck[1117]: fsck.fat 4.2 (2021-01-31) May 10 02:16:44.839355 systemd-fsck[1117]: /dev/vda1: 790 files, 120688/258078 clusters May 10 02:16:44.841150 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 02:16:44.848944 systemd[1]: Starting modprobe@dm_mod.service... May 10 02:16:44.857492 systemd[1]: Starting modprobe@efi_pstore.service... May 10 02:16:44.863247 systemd[1]: Starting modprobe@loop.service... May 10 02:16:44.867491 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 02:16:44.867702 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 02:16:44.867958 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 02:16:44.884569 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 10 02:16:44.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:44.889367 systemd[1]: Mounted usr-share-oem.mount. May 10 02:16:44.891496 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 02:16:44.891818 systemd[1]: Finished modprobe@dm_mod.service. May 10 02:16:44.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:44.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:44.894941 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 02:16:44.895696 systemd[1]: Finished modprobe@efi_pstore.service. May 10 02:16:44.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:44.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:44.898073 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 02:16:44.899021 systemd[1]: Finished modprobe@loop.service. May 10 02:16:44.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:44.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:44.909116 systemd[1]: Mounting boot.mount... May 10 02:16:44.909863 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 02:16:44.910000 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 02:16:44.910782 systemd[1]: Finished systemd-sysext.service. May 10 02:16:44.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:44.916395 systemd[1]: Starting ensure-sysext.service... May 10 02:16:44.919595 systemd[1]: Starting systemd-tmpfiles-setup.service... May 10 02:16:44.934550 systemd[1]: Reloading. May 10 02:16:44.944615 systemd-tmpfiles[1135]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 10 02:16:44.954376 systemd-tmpfiles[1135]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 10 02:16:44.962468 systemd-tmpfiles[1135]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 10 02:16:45.105796 /usr/lib/systemd/system-generators/torcx-generator[1158]: time="2025-05-10T02:16:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 02:16:45.105853 /usr/lib/systemd/system-generators/torcx-generator[1158]: time="2025-05-10T02:16:45Z" level=info msg="torcx already run" May 10 02:16:45.162187 ldconfig[1100]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 10 02:16:45.185773 systemd-networkd[1075]: eth0: Gained IPv6LL May 10 02:16:45.229738 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 02:16:45.229786 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 02:16:45.262189 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 02:16:45.357330 systemd[1]: Finished ldconfig.service. May 10 02:16:45.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.361013 systemd[1]: Mounted boot.mount. May 10 02:16:45.376900 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 02:16:45.379027 systemd[1]: Starting modprobe@dm_mod.service... May 10 02:16:45.381786 systemd[1]: Starting modprobe@efi_pstore.service... May 10 02:16:45.384762 systemd[1]: Starting modprobe@loop.service... May 10 02:16:45.385810 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 02:16:45.386026 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 02:16:45.390182 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 02:16:45.390445 systemd[1]: Finished modprobe@dm_mod.service. May 10 02:16:45.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.395184 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 02:16:45.395427 systemd[1]: Finished modprobe@efi_pstore.service. May 10 02:16:45.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.401107 systemd[1]: Finished systemd-boot-update.service. May 10 02:16:45.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.404945 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 02:16:45.406299 systemd[1]: Finished modprobe@loop.service. May 10 02:16:45.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.408950 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 02:16:45.409380 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 02:16:45.417423 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 02:16:45.419357 systemd[1]: Starting modprobe@dm_mod.service... May 10 02:16:45.421827 systemd[1]: Starting modprobe@efi_pstore.service... May 10 02:16:45.424220 systemd[1]: Starting modprobe@loop.service... May 10 02:16:45.424946 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 02:16:45.425448 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 02:16:45.431230 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 02:16:45.431476 systemd[1]: Finished modprobe@loop.service. May 10 02:16:45.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.432883 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 02:16:45.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.433231 systemd[1]: Finished modprobe@dm_mod.service. May 10 02:16:45.434292 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 02:16:45.441551 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 02:16:45.444648 systemd[1]: Starting modprobe@dm_mod.service... May 10 02:16:45.448439 systemd[1]: Starting modprobe@drm.service... May 10 02:16:45.453846 systemd[1]: Starting modprobe@loop.service... May 10 02:16:45.454695 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 02:16:45.454921 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 02:16:45.457197 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 02:16:45.461861 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 02:16:45.462428 systemd[1]: Finished modprobe@efi_pstore.service. May 10 02:16:45.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.464746 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 02:16:45.464985 systemd[1]: Finished modprobe@dm_mod.service. May 10 02:16:45.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.469175 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 02:16:45.469406 systemd[1]: Finished modprobe@drm.service. May 10 02:16:45.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.472899 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 02:16:45.473225 systemd[1]: Finished modprobe@loop.service. May 10 02:16:45.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.474858 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 02:16:45.474974 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 02:16:45.476391 systemd[1]: Finished ensure-sysext.service. May 10 02:16:45.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.484226 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 02:16:45.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.569238 systemd[1]: Finished systemd-tmpfiles-setup.service. May 10 02:16:45.572391 systemd[1]: Starting audit-rules.service... May 10 02:16:45.575357 systemd[1]: Starting clean-ca-certificates.service... May 10 02:16:45.583030 systemd[1]: Starting systemd-journal-catalog-update.service... May 10 02:16:45.586747 systemd[1]: Starting systemd-resolved.service... May 10 02:16:45.594241 systemd[1]: Starting systemd-timesyncd.service... May 10 02:16:45.600408 systemd[1]: Starting systemd-update-utmp.service... May 10 02:16:45.602419 systemd[1]: Finished clean-ca-certificates.service. May 10 02:16:45.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.604388 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 02:16:45.604466 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 02:16:45.604521 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 02:16:45.620000 audit[1248]: SYSTEM_BOOT pid=1248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 10 02:16:45.622828 systemd[1]: Finished systemd-update-utmp.service. May 10 02:16:45.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.664746 systemd[1]: Finished systemd-journal-catalog-update.service. May 10 02:16:45.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:16:45.669354 systemd[1]: Starting systemd-update-done.service... May 10 02:16:45.674000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 10 02:16:45.674000 audit[1258]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcb1a2e430 a2=420 a3=0 items=0 ppid=1236 pid=1258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:16:45.674000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 10 02:16:45.677447 augenrules[1258]: No rules May 10 02:16:45.678556 systemd[1]: Finished audit-rules.service. May 10 02:16:45.685481 systemd[1]: Finished systemd-update-done.service. May 10 02:16:45.727213 systemd-resolved[1241]: Positive Trust Anchors: May 10 02:16:45.727232 systemd-resolved[1241]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 02:16:45.727269 systemd-resolved[1241]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 02:16:45.735724 systemd-resolved[1241]: Using system hostname 'srv-slver.gb1.brightbox.com'. May 10 02:16:45.736488 systemd[1]: Started systemd-timesyncd.service. May 10 02:16:45.737498 systemd[1]: Reached target time-set.target. May 10 02:16:45.740222 systemd[1]: Started systemd-resolved.service. May 10 02:16:45.740982 systemd[1]: Reached target network.target. May 10 02:16:45.741616 systemd[1]: Reached target network-online.target. May 10 02:16:45.742310 systemd[1]: Reached target nss-lookup.target. May 10 02:16:45.742981 systemd[1]: Reached target sysinit.target. May 10 02:16:45.743747 systemd[1]: Started motdgen.path. May 10 02:16:45.744386 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 10 02:16:45.745383 systemd[1]: Started logrotate.timer. May 10 02:16:45.746132 systemd[1]: Started mdadm.timer. May 10 02:16:45.746749 systemd[1]: Started systemd-tmpfiles-clean.timer. May 10 02:16:45.747457 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 02:16:45.747508 systemd[1]: Reached target paths.target. May 10 02:16:45.748182 systemd[1]: Reached target timers.target. May 10 02:16:45.749318 systemd[1]: Listening on dbus.socket. May 10 02:16:45.752357 systemd[1]: Starting docker.socket... May 10 02:16:45.755116 systemd[1]: Listening on sshd.socket. May 10 02:16:45.755875 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 02:16:45.756292 systemd[1]: Listening on docker.socket. May 10 02:16:45.757092 systemd[1]: Reached target sockets.target. May 10 02:16:45.757715 systemd[1]: Reached target basic.target. May 10 02:16:45.758556 systemd[1]: System is tainted: cgroupsv1 May 10 02:16:45.758622 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 02:16:45.758661 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 02:16:45.760476 systemd[1]: Starting containerd.service... May 10 02:16:45.762927 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 10 02:16:45.766152 systemd-networkd[1075]: eth0: Ignoring DHCPv6 address 2a02:1348:179:83ad:24:19ff:fee6:eb6/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:179:83ad:24:19ff:fee6:eb6/64 assigned by NDisc. May 10 02:16:45.766160 systemd-networkd[1075]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. May 10 02:16:45.766876 systemd[1]: Starting dbus.service... May 10 02:16:45.783106 systemd[1]: Starting enable-oem-cloudinit.service... May 10 02:16:45.786003 systemd[1]: Starting extend-filesystems.service... May 10 02:16:45.786951 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 10 02:16:45.789476 systemd[1]: Starting kubelet.service... May 10 02:16:45.793683 systemd[1]: Starting motdgen.service... May 10 02:16:45.802358 systemd[1]: Starting ssh-key-proc-cmdline.service... May 10 02:16:45.805243 systemd[1]: Starting sshd-keygen.service... May 10 02:16:45.812414 systemd[1]: Starting systemd-logind.service... May 10 02:16:45.817206 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 02:16:45.817406 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 10 02:16:45.819807 systemd[1]: Starting update-engine.service... May 10 02:16:45.823193 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 10 02:16:45.832108 jq[1288]: true May 10 02:16:45.859449 jq[1276]: false May 10 02:16:45.863815 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 10 02:16:45.864315 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 10 02:16:45.868322 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 10 02:16:45.868649 systemd[1]: Finished ssh-key-proc-cmdline.service. May 10 02:16:46.581186 systemd-resolved[1241]: Clock change detected. Flushing caches. May 10 02:16:46.581364 systemd-timesyncd[1247]: Contacted time server 109.74.206.120:123 (0.flatcar.pool.ntp.org). May 10 02:16:46.581503 systemd-timesyncd[1247]: Initial clock synchronization to Sat 2025-05-10 02:16:46.581102 UTC. May 10 02:16:46.590814 jq[1292]: true May 10 02:16:46.602068 dbus-daemon[1273]: [system] SELinux support is enabled May 10 02:16:46.602392 systemd[1]: Started dbus.service. May 10 02:16:46.606688 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 10 02:16:46.606740 systemd[1]: Reached target system-config.target. May 10 02:16:46.607536 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 10 02:16:46.607562 systemd[1]: Reached target user-config.target. May 10 02:16:46.616320 dbus-daemon[1273]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1075 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") May 10 02:16:46.621140 systemd[1]: Starting systemd-hostnamed.service... May 10 02:16:46.650772 extend-filesystems[1277]: Found loop1 May 10 02:16:46.650772 extend-filesystems[1277]: Found vda May 10 02:16:46.650772 extend-filesystems[1277]: Found vda1 May 10 02:16:46.650772 extend-filesystems[1277]: Found vda2 May 10 02:16:46.650772 extend-filesystems[1277]: Found vda3 May 10 02:16:46.650772 extend-filesystems[1277]: Found usr May 10 02:16:46.650772 extend-filesystems[1277]: Found vda4 May 10 02:16:46.650772 extend-filesystems[1277]: Found vda6 May 10 02:16:46.650772 extend-filesystems[1277]: Found vda7 May 10 02:16:46.650772 extend-filesystems[1277]: Found vda9 May 10 02:16:46.666905 extend-filesystems[1277]: Checking size of /dev/vda9 May 10 02:16:46.654907 systemd[1]: motdgen.service: Deactivated successfully. May 10 02:16:46.655286 systemd[1]: Finished motdgen.service. May 10 02:16:46.684888 extend-filesystems[1277]: Resized partition /dev/vda9 May 10 02:16:46.709706 extend-filesystems[1329]: resize2fs 1.46.5 (30-Dec-2021) May 10 02:16:46.715467 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks May 10 02:16:46.730323 update_engine[1287]: I0510 02:16:46.729707 1287 main.cc:92] Flatcar Update Engine starting May 10 02:16:46.738293 systemd[1]: Started update-engine.service. May 10 02:16:46.739174 update_engine[1287]: I0510 02:16:46.739142 1287 update_check_scheduler.cc:74] Next update check in 11m48s May 10 02:16:46.741779 systemd[1]: Started locksmithd.service. May 10 02:16:46.799190 systemd-logind[1285]: Watching system buttons on /dev/input/event2 (Power Button) May 10 02:16:46.799287 systemd-logind[1285]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 10 02:16:46.804596 systemd-logind[1285]: New seat seat0. May 10 02:16:46.807652 systemd[1]: Started systemd-logind.service. May 10 02:16:46.816711 bash[1333]: Updated "/home/core/.ssh/authorized_keys" May 10 02:16:46.817529 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 10 02:16:46.874492 env[1294]: time="2025-05-10T02:16:46.873406583Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 10 02:16:46.895872 dbus-daemon[1273]: [system] Successfully activated service 'org.freedesktop.hostname1' May 10 02:16:46.896061 systemd[1]: Started systemd-hostnamed.service. May 10 02:16:46.897588 dbus-daemon[1273]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1314 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") May 10 02:16:46.901519 systemd[1]: Starting polkit.service... May 10 02:16:46.923193 polkitd[1339]: Started polkitd version 121 May 10 02:16:46.924252 env[1294]: time="2025-05-10T02:16:46.924203719Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 10 02:16:46.925773 env[1294]: time="2025-05-10T02:16:46.925309373Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 10 02:16:46.932998 env[1294]: time="2025-05-10T02:16:46.932954697Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 10 02:16:46.933137 env[1294]: time="2025-05-10T02:16:46.933105671Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 10 02:16:46.936334 env[1294]: time="2025-05-10T02:16:46.936296333Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 02:16:46.936926 env[1294]: time="2025-05-10T02:16:46.936894192Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 10 02:16:46.937728 env[1294]: time="2025-05-10T02:16:46.937693896Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 10 02:16:46.939520 polkitd[1339]: Loading rules from directory /etc/polkit-1/rules.d May 10 02:16:46.939761 polkitd[1339]: Loading rules from directory /usr/share/polkit-1/rules.d May 10 02:16:46.939992 env[1294]: time="2025-05-10T02:16:46.939960424Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 10 02:16:46.940702 env[1294]: time="2025-05-10T02:16:46.940638239Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 10 02:16:46.941784 env[1294]: time="2025-05-10T02:16:46.941744507Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 10 02:16:46.941993 polkitd[1339]: Finished loading, compiling and executing 2 rules May 10 02:16:46.942627 dbus-daemon[1273]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' May 10 02:16:46.942870 systemd[1]: Started polkit.service. May 10 02:16:46.943548 polkitd[1339]: Acquired the name org.freedesktop.PolicyKit1 on the system bus May 10 02:16:46.944672 env[1294]: time="2025-05-10T02:16:46.944614580Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 02:16:46.945227 env[1294]: time="2025-05-10T02:16:46.945195381Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 10 02:16:46.945485 env[1294]: time="2025-05-10T02:16:46.945444424Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 10 02:16:46.945638 env[1294]: time="2025-05-10T02:16:46.945608321Z" level=info msg="metadata content store policy set" policy=shared May 10 02:16:46.961444 kernel: EXT4-fs (vda9): resized filesystem to 15121403 May 10 02:16:46.962079 systemd-hostnamed[1314]: Hostname set to (static) May 10 02:16:46.977546 extend-filesystems[1329]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 10 02:16:46.977546 extend-filesystems[1329]: old_desc_blocks = 1, new_desc_blocks = 8 May 10 02:16:46.977546 extend-filesystems[1329]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. May 10 02:16:46.983647 extend-filesystems[1277]: Resized filesystem in /dev/vda9 May 10 02:16:46.986309 env[1294]: time="2025-05-10T02:16:46.980905055Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 10 02:16:46.986309 env[1294]: time="2025-05-10T02:16:46.980953723Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 10 02:16:46.986309 env[1294]: time="2025-05-10T02:16:46.980975575Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 10 02:16:46.986309 env[1294]: time="2025-05-10T02:16:46.981044278Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 10 02:16:46.986309 env[1294]: time="2025-05-10T02:16:46.981087388Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 10 02:16:46.986309 env[1294]: time="2025-05-10T02:16:46.981114528Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 10 02:16:46.986309 env[1294]: time="2025-05-10T02:16:46.981136793Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 10 02:16:46.986309 env[1294]: time="2025-05-10T02:16:46.981157389Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 10 02:16:46.986309 env[1294]: time="2025-05-10T02:16:46.981177279Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 10 02:16:46.986309 env[1294]: time="2025-05-10T02:16:46.981210930Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 10 02:16:46.986309 env[1294]: time="2025-05-10T02:16:46.981233611Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 10 02:16:46.986309 env[1294]: time="2025-05-10T02:16:46.981260211Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 10 02:16:46.986309 env[1294]: time="2025-05-10T02:16:46.981469540Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 10 02:16:46.986309 env[1294]: time="2025-05-10T02:16:46.981640664Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 10 02:16:46.978634 systemd[1]: extend-filesystems.service: Deactivated successfully. May 10 02:16:46.987097 env[1294]: time="2025-05-10T02:16:46.982535110Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 10 02:16:46.987097 env[1294]: time="2025-05-10T02:16:46.982602186Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 10 02:16:46.987097 env[1294]: time="2025-05-10T02:16:46.982628904Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 10 02:16:46.987097 env[1294]: time="2025-05-10T02:16:46.982922975Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 10 02:16:46.987097 env[1294]: time="2025-05-10T02:16:46.982962424Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 10 02:16:46.987097 env[1294]: time="2025-05-10T02:16:46.982993379Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 10 02:16:46.987097 env[1294]: time="2025-05-10T02:16:46.983019891Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 10 02:16:46.987097 env[1294]: time="2025-05-10T02:16:46.983041461Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 10 02:16:46.987097 env[1294]: time="2025-05-10T02:16:46.983072219Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 10 02:16:46.987097 env[1294]: time="2025-05-10T02:16:46.983095501Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 10 02:16:46.987097 env[1294]: time="2025-05-10T02:16:46.983117515Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 10 02:16:46.987097 env[1294]: time="2025-05-10T02:16:46.983152687Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 10 02:16:46.987097 env[1294]: time="2025-05-10T02:16:46.983362727Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 10 02:16:46.987097 env[1294]: time="2025-05-10T02:16:46.983389796Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 10 02:16:46.987097 env[1294]: time="2025-05-10T02:16:46.983410509Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 10 02:16:46.979006 systemd[1]: Finished extend-filesystems.service. May 10 02:16:46.987873 env[1294]: time="2025-05-10T02:16:46.983608488Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 10 02:16:46.987873 env[1294]: time="2025-05-10T02:16:46.983633205Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 10 02:16:46.987873 env[1294]: time="2025-05-10T02:16:46.983665872Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 10 02:16:46.987873 env[1294]: time="2025-05-10T02:16:46.983714414Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 10 02:16:46.987873 env[1294]: time="2025-05-10T02:16:46.983779831Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 10 02:16:46.987322 systemd[1]: Started containerd.service. May 10 02:16:46.988197 env[1294]: time="2025-05-10T02:16:46.984112742Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:false] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 10 02:16:46.988197 env[1294]: time="2025-05-10T02:16:46.984202187Z" level=info msg="Connect containerd service" May 10 02:16:46.988197 env[1294]: time="2025-05-10T02:16:46.984289168Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 10 02:16:46.988197 env[1294]: time="2025-05-10T02:16:46.986475906Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 02:16:46.988197 env[1294]: time="2025-05-10T02:16:46.987024448Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 10 02:16:46.988197 env[1294]: time="2025-05-10T02:16:46.987123027Z" level=info msg=serving... address=/run/containerd/containerd.sock May 10 02:16:46.997683 env[1294]: time="2025-05-10T02:16:46.989667999Z" level=info msg="containerd successfully booted in 0.120203s" May 10 02:16:46.997683 env[1294]: time="2025-05-10T02:16:46.992554613Z" level=info msg="Start subscribing containerd event" May 10 02:16:47.001442 env[1294]: time="2025-05-10T02:16:46.999659285Z" level=info msg="Start recovering state" May 10 02:16:47.001442 env[1294]: time="2025-05-10T02:16:46.999839158Z" level=info msg="Start event monitor" May 10 02:16:47.001442 env[1294]: time="2025-05-10T02:16:46.999884117Z" level=info msg="Start snapshots syncer" May 10 02:16:47.001442 env[1294]: time="2025-05-10T02:16:46.999910832Z" level=info msg="Start cni network conf syncer for default" May 10 02:16:47.001442 env[1294]: time="2025-05-10T02:16:46.999934061Z" level=info msg="Start streaming server" May 10 02:16:47.190264 locksmithd[1334]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 10 02:16:47.840467 systemd[1]: Started kubelet.service. May 10 02:16:48.584363 kubelet[1359]: E0510 02:16:48.584254 1359 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 02:16:48.586930 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 02:16:48.587266 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 02:16:48.744882 sshd_keygen[1295]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 10 02:16:48.772404 systemd[1]: Finished sshd-keygen.service. May 10 02:16:48.777943 systemd[1]: Starting issuegen.service... May 10 02:16:48.787799 systemd[1]: issuegen.service: Deactivated successfully. May 10 02:16:48.788127 systemd[1]: Finished issuegen.service. May 10 02:16:48.791307 systemd[1]: Starting systemd-user-sessions.service... May 10 02:16:48.801037 systemd[1]: Finished systemd-user-sessions.service. May 10 02:16:48.804705 systemd[1]: Started getty@tty1.service. May 10 02:16:48.808588 systemd[1]: Started serial-getty@ttyS0.service. May 10 02:16:48.810399 systemd[1]: Reached target getty.target. May 10 02:16:53.593021 coreos-metadata[1271]: May 10 02:16:53.592 WARN failed to locate config-drive, using the metadata service API instead May 10 02:16:53.649159 coreos-metadata[1271]: May 10 02:16:53.649 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 May 10 02:16:53.689302 coreos-metadata[1271]: May 10 02:16:53.689 INFO Fetch successful May 10 02:16:53.689640 coreos-metadata[1271]: May 10 02:16:53.689 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 May 10 02:16:53.718497 coreos-metadata[1271]: May 10 02:16:53.718 INFO Fetch successful May 10 02:16:53.720705 unknown[1271]: wrote ssh authorized keys file for user: core May 10 02:16:53.734318 update-ssh-keys[1387]: Updated "/home/core/.ssh/authorized_keys" May 10 02:16:53.734989 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 10 02:16:53.736384 systemd[1]: Reached target multi-user.target. May 10 02:16:53.740528 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 10 02:16:53.753756 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 10 02:16:53.754148 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 10 02:16:53.761916 systemd[1]: Startup finished in 7.422s (kernel) + 14.125s (userspace) = 21.548s. May 10 02:16:56.535922 systemd[1]: Created slice system-sshd.slice. May 10 02:16:56.538933 systemd[1]: Started sshd@0-10.230.14.182:22-139.178.68.195:55424.service. May 10 02:16:57.450885 sshd[1392]: Accepted publickey for core from 139.178.68.195 port 55424 ssh2: RSA SHA256:WN4f51QI5pkflGflnLefC3FAKa0BnDYOIe8vab4uHa0 May 10 02:16:57.454143 sshd[1392]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 02:16:57.472380 systemd[1]: Created slice user-500.slice. May 10 02:16:57.474222 systemd[1]: Starting user-runtime-dir@500.service... May 10 02:16:57.478514 systemd-logind[1285]: New session 1 of user core. May 10 02:16:57.497203 systemd[1]: Finished user-runtime-dir@500.service. May 10 02:16:57.499638 systemd[1]: Starting user@500.service... May 10 02:16:57.508333 (systemd)[1397]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 10 02:16:57.620107 systemd[1397]: Queued start job for default target default.target. May 10 02:16:57.620573 systemd[1397]: Reached target paths.target. May 10 02:16:57.620605 systemd[1397]: Reached target sockets.target. May 10 02:16:57.620626 systemd[1397]: Reached target timers.target. May 10 02:16:57.620645 systemd[1397]: Reached target basic.target. May 10 02:16:57.620924 systemd[1]: Started user@500.service. May 10 02:16:57.622616 systemd[1]: Started session-1.scope. May 10 02:16:57.623849 systemd[1397]: Reached target default.target. May 10 02:16:57.624236 systemd[1397]: Startup finished in 105ms. May 10 02:16:58.251368 systemd[1]: Started sshd@1-10.230.14.182:22-139.178.68.195:55432.service. May 10 02:16:58.838957 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 10 02:16:58.839331 systemd[1]: Stopped kubelet.service. May 10 02:16:58.842318 systemd[1]: Starting kubelet.service... May 10 02:16:59.023220 systemd[1]: Started kubelet.service. May 10 02:16:59.098431 kubelet[1416]: E0510 02:16:59.098203 1416 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 02:16:59.103255 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 02:16:59.103662 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 02:16:59.145789 sshd[1406]: Accepted publickey for core from 139.178.68.195 port 55432 ssh2: RSA SHA256:WN4f51QI5pkflGflnLefC3FAKa0BnDYOIe8vab4uHa0 May 10 02:16:59.147287 sshd[1406]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 02:16:59.155184 systemd-logind[1285]: New session 2 of user core. May 10 02:16:59.155916 systemd[1]: Started session-2.scope. May 10 02:16:59.765592 sshd[1406]: pam_unix(sshd:session): session closed for user core May 10 02:16:59.769907 systemd[1]: sshd@1-10.230.14.182:22-139.178.68.195:55432.service: Deactivated successfully. May 10 02:16:59.771282 systemd-logind[1285]: Session 2 logged out. Waiting for processes to exit. May 10 02:16:59.771391 systemd[1]: session-2.scope: Deactivated successfully. May 10 02:16:59.772892 systemd-logind[1285]: Removed session 2. May 10 02:16:59.914848 systemd[1]: Started sshd@2-10.230.14.182:22-139.178.68.195:55440.service. May 10 02:17:00.817120 sshd[1429]: Accepted publickey for core from 139.178.68.195 port 55440 ssh2: RSA SHA256:WN4f51QI5pkflGflnLefC3FAKa0BnDYOIe8vab4uHa0 May 10 02:17:00.820156 sshd[1429]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 02:17:00.828566 systemd[1]: Started session-3.scope. May 10 02:17:00.829038 systemd-logind[1285]: New session 3 of user core. May 10 02:17:01.438303 sshd[1429]: pam_unix(sshd:session): session closed for user core May 10 02:17:01.444276 systemd[1]: sshd@2-10.230.14.182:22-139.178.68.195:55440.service: Deactivated successfully. May 10 02:17:01.445569 systemd[1]: session-3.scope: Deactivated successfully. May 10 02:17:01.447260 systemd-logind[1285]: Session 3 logged out. Waiting for processes to exit. May 10 02:17:01.448710 systemd-logind[1285]: Removed session 3. May 10 02:17:01.583922 systemd[1]: Started sshd@3-10.230.14.182:22-139.178.68.195:55450.service. May 10 02:17:02.478450 sshd[1436]: Accepted publickey for core from 139.178.68.195 port 55450 ssh2: RSA SHA256:WN4f51QI5pkflGflnLefC3FAKa0BnDYOIe8vab4uHa0 May 10 02:17:02.480616 sshd[1436]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 02:17:02.490537 systemd-logind[1285]: New session 4 of user core. May 10 02:17:02.490856 systemd[1]: Started session-4.scope. May 10 02:17:03.098522 sshd[1436]: pam_unix(sshd:session): session closed for user core May 10 02:17:03.102755 systemd[1]: sshd@3-10.230.14.182:22-139.178.68.195:55450.service: Deactivated successfully. May 10 02:17:03.103938 systemd[1]: session-4.scope: Deactivated successfully. May 10 02:17:03.106124 systemd-logind[1285]: Session 4 logged out. Waiting for processes to exit. May 10 02:17:03.108086 systemd-logind[1285]: Removed session 4. May 10 02:17:03.244186 systemd[1]: Started sshd@4-10.230.14.182:22-139.178.68.195:55460.service. May 10 02:17:04.149997 sshd[1443]: Accepted publickey for core from 139.178.68.195 port 55460 ssh2: RSA SHA256:WN4f51QI5pkflGflnLefC3FAKa0BnDYOIe8vab4uHa0 May 10 02:17:04.153226 sshd[1443]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 02:17:04.161461 systemd[1]: Started session-5.scope. May 10 02:17:04.162105 systemd-logind[1285]: New session 5 of user core. May 10 02:17:04.642442 sudo[1447]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 10 02:17:04.642881 sudo[1447]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 02:17:04.652694 dbus-daemon[1273]: \xd0\u001d\xa2\x9b4V: received setenforce notice (enforcing=848854128) May 10 02:17:04.656486 sudo[1447]: pam_unix(sudo:session): session closed for user root May 10 02:17:04.802900 sshd[1443]: pam_unix(sshd:session): session closed for user core May 10 02:17:04.808248 systemd-logind[1285]: Session 5 logged out. Waiting for processes to exit. May 10 02:17:04.808752 systemd[1]: sshd@4-10.230.14.182:22-139.178.68.195:55460.service: Deactivated successfully. May 10 02:17:04.810371 systemd[1]: session-5.scope: Deactivated successfully. May 10 02:17:04.811138 systemd-logind[1285]: Removed session 5. May 10 02:17:04.946387 systemd[1]: Started sshd@5-10.230.14.182:22-139.178.68.195:55472.service. May 10 02:17:05.837471 sshd[1451]: Accepted publickey for core from 139.178.68.195 port 55472 ssh2: RSA SHA256:WN4f51QI5pkflGflnLefC3FAKa0BnDYOIe8vab4uHa0 May 10 02:17:05.840142 sshd[1451]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 02:17:05.847592 systemd[1]: Started session-6.scope. May 10 02:17:05.848424 systemd-logind[1285]: New session 6 of user core. May 10 02:17:06.311547 sudo[1456]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 10 02:17:06.311933 sudo[1456]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 02:17:06.316583 sudo[1456]: pam_unix(sudo:session): session closed for user root May 10 02:17:06.323241 sudo[1455]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 10 02:17:06.323636 sudo[1455]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 02:17:06.336746 systemd[1]: Stopping audit-rules.service... May 10 02:17:06.338000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 02:17:06.342531 kernel: kauditd_printk_skb: 151 callbacks suppressed May 10 02:17:06.342663 kernel: audit: type=1305 audit(1746843426.338:162): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 02:17:06.343658 auditctl[1459]: No rules May 10 02:17:06.345740 systemd[1]: audit-rules.service: Deactivated successfully. May 10 02:17:06.346218 systemd[1]: Stopped audit-rules.service. May 10 02:17:06.338000 audit[1459]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe080b6080 a2=420 a3=0 items=0 ppid=1 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:06.349979 systemd[1]: Starting audit-rules.service... May 10 02:17:06.360784 kernel: audit: type=1300 audit(1746843426.338:162): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe080b6080 a2=420 a3=0 items=0 ppid=1 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:06.360871 kernel: audit: type=1327 audit(1746843426.338:162): proctitle=2F7362696E2F617564697463746C002D44 May 10 02:17:06.338000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 10 02:17:06.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:06.366444 kernel: audit: type=1131 audit(1746843426.345:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:06.381198 augenrules[1477]: No rules May 10 02:17:06.382206 systemd[1]: Finished audit-rules.service. May 10 02:17:06.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:06.383664 sudo[1455]: pam_unix(sudo:session): session closed for user root May 10 02:17:06.382000 audit[1455]: USER_END pid=1455 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 02:17:06.394344 kernel: audit: type=1130 audit(1746843426.382:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:06.394439 kernel: audit: type=1106 audit(1746843426.382:165): pid=1455 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 02:17:06.394483 kernel: audit: type=1104 audit(1746843426.382:166): pid=1455 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 02:17:06.382000 audit[1455]: CRED_DISP pid=1455 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 02:17:06.526923 sshd[1451]: pam_unix(sshd:session): session closed for user core May 10 02:17:06.528000 audit[1451]: USER_END pid=1451 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 02:17:06.531583 systemd[1]: sshd@5-10.230.14.182:22-139.178.68.195:55472.service: Deactivated successfully. May 10 02:17:06.539490 kernel: audit: type=1106 audit(1746843426.528:167): pid=1451 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 02:17:06.528000 audit[1451]: CRED_DISP pid=1451 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 02:17:06.540003 systemd[1]: session-6.scope: Deactivated successfully. May 10 02:17:06.541370 systemd-logind[1285]: Session 6 logged out. Waiting for processes to exit. May 10 02:17:06.542926 systemd-logind[1285]: Removed session 6. May 10 02:17:06.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.230.14.182:22-139.178.68.195:55472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:06.552454 kernel: audit: type=1104 audit(1746843426.528:168): pid=1451 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 02:17:06.552540 kernel: audit: type=1131 audit(1746843426.531:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.230.14.182:22-139.178.68.195:55472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:06.674770 systemd[1]: Started sshd@6-10.230.14.182:22-139.178.68.195:40368.service. May 10 02:17:06.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.230.14.182:22-139.178.68.195:40368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:07.568000 audit[1484]: USER_ACCT pid=1484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 02:17:07.569485 sshd[1484]: Accepted publickey for core from 139.178.68.195 port 40368 ssh2: RSA SHA256:WN4f51QI5pkflGflnLefC3FAKa0BnDYOIe8vab4uHa0 May 10 02:17:07.570000 audit[1484]: CRED_ACQ pid=1484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 02:17:07.570000 audit[1484]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4461b410 a2=3 a3=0 items=0 ppid=1 pid=1484 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:07.570000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 02:17:07.571992 sshd[1484]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 02:17:07.580190 systemd-logind[1285]: New session 7 of user core. May 10 02:17:07.581145 systemd[1]: Started session-7.scope. May 10 02:17:07.589000 audit[1484]: USER_START pid=1484 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 02:17:07.591000 audit[1487]: CRED_ACQ pid=1487 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 02:17:08.100000 audit[1488]: USER_ACCT pid=1488 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 02:17:08.101554 sudo[1488]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 10 02:17:08.101000 audit[1488]: CRED_REFR pid=1488 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 02:17:08.102591 sudo[1488]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 02:17:08.105000 audit[1488]: USER_START pid=1488 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 02:17:08.123567 systemd[1]: Starting coreos-metadata.service... May 10 02:17:09.355261 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 10 02:17:09.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:09.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:09.355852 systemd[1]: Stopped kubelet.service. May 10 02:17:09.358890 systemd[1]: Starting kubelet.service... May 10 02:17:09.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:09.484603 systemd[1]: Started kubelet.service. May 10 02:17:09.611288 kubelet[1504]: E0510 02:17:09.611101 1504 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 02:17:09.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 02:17:09.613819 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 02:17:09.614106 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 02:17:15.172920 coreos-metadata[1492]: May 10 02:17:15.172 WARN failed to locate config-drive, using the metadata service API instead May 10 02:17:15.224661 coreos-metadata[1492]: May 10 02:17:15.224 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 May 10 02:17:15.226348 coreos-metadata[1492]: May 10 02:17:15.226 INFO Fetch successful May 10 02:17:15.226649 coreos-metadata[1492]: May 10 02:17:15.226 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 May 10 02:17:15.249210 coreos-metadata[1492]: May 10 02:17:15.248 INFO Fetch successful May 10 02:17:15.249568 coreos-metadata[1492]: May 10 02:17:15.249 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 May 10 02:17:15.279499 coreos-metadata[1492]: May 10 02:17:15.279 INFO Fetch successful May 10 02:17:15.279821 coreos-metadata[1492]: May 10 02:17:15.279 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 May 10 02:17:15.296343 coreos-metadata[1492]: May 10 02:17:15.296 INFO Fetch successful May 10 02:17:15.296713 coreos-metadata[1492]: May 10 02:17:15.296 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 May 10 02:17:15.314188 coreos-metadata[1492]: May 10 02:17:15.313 INFO Fetch successful May 10 02:17:15.333948 kernel: kauditd_printk_skb: 15 callbacks suppressed May 10 02:17:15.334145 kernel: audit: type=1130 audit(1746843435.328:183): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:15.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:15.328644 systemd[1]: Finished coreos-metadata.service. May 10 02:17:16.156002 systemd[1]: Stopped kubelet.service. May 10 02:17:16.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:16.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:16.165791 systemd[1]: Starting kubelet.service... May 10 02:17:16.170121 kernel: audit: type=1130 audit(1746843436.156:184): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:16.170233 kernel: audit: type=1131 audit(1746843436.156:185): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:16.199991 systemd[1]: Reloading. May 10 02:17:16.356485 /usr/lib/systemd/system-generators/torcx-generator[1575]: time="2025-05-10T02:17:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 02:17:16.356539 /usr/lib/systemd/system-generators/torcx-generator[1575]: time="2025-05-10T02:17:16Z" level=info msg="torcx already run" May 10 02:17:16.468053 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 02:17:16.468708 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 02:17:16.500612 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 02:17:16.623564 systemd[1]: Started kubelet.service. May 10 02:17:16.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:16.631453 kernel: audit: type=1130 audit(1746843436.623:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:16.632816 systemd[1]: Stopping kubelet.service... May 10 02:17:16.635797 systemd[1]: kubelet.service: Deactivated successfully. May 10 02:17:16.636138 systemd[1]: Stopped kubelet.service. May 10 02:17:16.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:16.641438 kernel: audit: type=1131 audit(1746843436.635:187): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:16.644753 systemd[1]: Starting kubelet.service... May 10 02:17:16.764201 systemd[1]: Started kubelet.service. May 10 02:17:16.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:16.771441 kernel: audit: type=1130 audit(1746843436.764:188): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:16.850865 kubelet[1647]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 02:17:16.850865 kubelet[1647]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 02:17:16.850865 kubelet[1647]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 02:17:16.855443 kubelet[1647]: I0510 02:17:16.855351 1647 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 02:17:16.995806 systemd[1]: systemd-hostnamed.service: Deactivated successfully. May 10 02:17:16.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:17.002439 kernel: audit: type=1131 audit(1746843436.995:189): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:17.351889 kubelet[1647]: I0510 02:17:17.351841 1647 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 10 02:17:17.352153 kubelet[1647]: I0510 02:17:17.352131 1647 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 02:17:17.352580 kubelet[1647]: I0510 02:17:17.352552 1647 server.go:927] "Client rotation is on, will bootstrap in background" May 10 02:17:17.372546 kubelet[1647]: I0510 02:17:17.372495 1647 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 02:17:17.394937 kubelet[1647]: I0510 02:17:17.394903 1647 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 02:17:17.397812 kubelet[1647]: I0510 02:17:17.397766 1647 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 02:17:17.398198 kubelet[1647]: I0510 02:17:17.397933 1647 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.230.14.182","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"cgroupfs","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 10 02:17:17.398602 kubelet[1647]: I0510 02:17:17.398576 1647 topology_manager.go:138] "Creating topology manager with none policy" May 10 02:17:17.398724 kubelet[1647]: I0510 02:17:17.398703 1647 container_manager_linux.go:301] "Creating device plugin manager" May 10 02:17:17.399036 kubelet[1647]: I0510 02:17:17.399014 1647 state_mem.go:36] "Initialized new in-memory state store" May 10 02:17:17.400302 kubelet[1647]: I0510 02:17:17.400273 1647 kubelet.go:400] "Attempting to sync node with API server" May 10 02:17:17.400507 kubelet[1647]: I0510 02:17:17.400483 1647 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 02:17:17.400668 kubelet[1647]: I0510 02:17:17.400643 1647 kubelet.go:312] "Adding apiserver pod source" May 10 02:17:17.400833 kubelet[1647]: I0510 02:17:17.400808 1647 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 02:17:17.401899 kubelet[1647]: E0510 02:17:17.401691 1647 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:17.406014 kubelet[1647]: E0510 02:17:17.405972 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:17.410806 kubelet[1647]: I0510 02:17:17.410776 1647 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 02:17:17.412638 kubelet[1647]: I0510 02:17:17.412580 1647 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 02:17:17.412770 kubelet[1647]: W0510 02:17:17.412744 1647 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 10 02:17:17.413392 kubelet[1647]: W0510 02:17:17.413363 1647 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.230.14.182" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope May 10 02:17:17.413592 kubelet[1647]: E0510 02:17:17.413566 1647 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.230.14.182" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope May 10 02:17:17.413906 kubelet[1647]: I0510 02:17:17.413879 1647 server.go:1264] "Started kubelet" May 10 02:17:17.414070 kubelet[1647]: W0510 02:17:17.414042 1647 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope May 10 02:17:17.414201 kubelet[1647]: E0510 02:17:17.414177 1647 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope May 10 02:17:17.414440 kubelet[1647]: I0510 02:17:17.414384 1647 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 02:17:17.417000 audit[1647]: AVC avc: denied { mac_admin } for pid=1647 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:17.420893 kubelet[1647]: I0510 02:17:17.420804 1647 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 02:17:17.421223 kubelet[1647]: I0510 02:17:17.421195 1647 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 02:17:17.421504 kubelet[1647]: I0510 02:17:17.421482 1647 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 02:17:17.426446 kernel: audit: type=1400 audit(1746843437.417:190): avc: denied { mac_admin } for pid=1647 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:17.426578 kernel: audit: type=1401 audit(1746843437.417:190): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 02:17:17.417000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 02:17:17.417000 audit[1647]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a64870 a1=c000793248 a2=c000a64840 a3=25 items=0 ppid=1 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:17.435779 kubelet[1647]: I0510 02:17:17.435747 1647 server.go:455] "Adding debug handlers to kubelet server" May 10 02:17:17.417000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 02:17:17.417000 audit[1647]: AVC avc: denied { mac_admin } for pid=1647 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:17.417000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 02:17:17.417000 audit[1647]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a3ee00 a1=c000793260 a2=c000a64900 a3=25 items=0 ppid=1 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:17.417000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 02:17:17.438451 kernel: audit: type=1300 audit(1746843437.417:190): arch=c000003e syscall=188 success=no exit=-22 a0=c000a64870 a1=c000793248 a2=c000a64840 a3=25 items=0 ppid=1 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:17.440095 kubelet[1647]: I0510 02:17:17.439990 1647 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 02:17:17.440398 kubelet[1647]: I0510 02:17:17.440372 1647 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 02:17:17.453344 kubelet[1647]: I0510 02:17:17.453300 1647 volume_manager.go:291] "Starting Kubelet Volume Manager" May 10 02:17:17.453562 kubelet[1647]: I0510 02:17:17.453515 1647 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 02:17:17.453684 kubelet[1647]: I0510 02:17:17.453657 1647 reconciler.go:26] "Reconciler: start to sync state" May 10 02:17:17.461330 kubelet[1647]: I0510 02:17:17.461287 1647 factory.go:221] Registration of the systemd container factory successfully May 10 02:17:17.461567 kubelet[1647]: I0510 02:17:17.461530 1647 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 02:17:17.468098 kubelet[1647]: I0510 02:17:17.468064 1647 factory.go:221] Registration of the containerd container factory successfully May 10 02:17:17.512000 audit[1662]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1662 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:17.512000 audit[1662]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd1f9083b0 a2=0 a3=7ffd1f90839c items=0 ppid=1647 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:17.512000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 02:17:17.519000 audit[1668]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1668 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:17.519000 audit[1668]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffcf920c5e0 a2=0 a3=7ffcf920c5cc items=0 ppid=1647 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:17.519000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 02:17:17.528125 kubelet[1647]: I0510 02:17:17.528076 1647 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 02:17:17.528125 kubelet[1647]: I0510 02:17:17.528110 1647 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 02:17:17.528454 kubelet[1647]: I0510 02:17:17.528144 1647 state_mem.go:36] "Initialized new in-memory state store" May 10 02:17:17.539460 kubelet[1647]: I0510 02:17:17.539393 1647 policy_none.go:49] "None policy: Start" May 10 02:17:17.540863 kubelet[1647]: E0510 02:17:17.540600 1647 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.230.14.182\" not found" node="10.230.14.182" May 10 02:17:17.541728 kubelet[1647]: I0510 02:17:17.541703 1647 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 02:17:17.541881 kubelet[1647]: I0510 02:17:17.541856 1647 state_mem.go:35] "Initializing new in-memory state store" May 10 02:17:17.524000 audit[1670]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1670 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:17.524000 audit[1670]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe00d6b520 a2=0 a3=7ffe00d6b50c items=0 ppid=1647 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:17.524000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 02:17:17.547000 audit[1675]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1675 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:17.547000 audit[1675]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd31689570 a2=0 a3=7ffd3168955c items=0 ppid=1647 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:17.547000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 02:17:17.554742 kubelet[1647]: I0510 02:17:17.554704 1647 kubelet_node_status.go:73] "Attempting to register node" node="10.230.14.182" May 10 02:17:17.557640 kubelet[1647]: I0510 02:17:17.557608 1647 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 02:17:17.559000 audit[1647]: AVC avc: denied { mac_admin } for pid=1647 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:17.559000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 02:17:17.559000 audit[1647]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00094a720 a1=c00093b980 a2=c00094a6f0 a3=25 items=0 ppid=1 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:17.559000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 02:17:17.560018 kubelet[1647]: I0510 02:17:17.559580 1647 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 02:17:17.560018 kubelet[1647]: I0510 02:17:17.559814 1647 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 02:17:17.560018 kubelet[1647]: I0510 02:17:17.559984 1647 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 02:17:17.564473 kubelet[1647]: I0510 02:17:17.562366 1647 kubelet_node_status.go:76] "Successfully registered node" node="10.230.14.182" May 10 02:17:17.569140 kubelet[1647]: E0510 02:17:17.569117 1647 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.230.14.182\" not found" May 10 02:17:17.588260 kubelet[1647]: E0510 02:17:17.588221 1647 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.230.14.182\" not found" May 10 02:17:17.621000 audit[1681]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1681 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:17.621000 audit[1681]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc480df7f0 a2=0 a3=7ffc480df7dc items=0 ppid=1647 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:17.621000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 10 02:17:17.624898 kubelet[1647]: I0510 02:17:17.624652 1647 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 02:17:17.626000 audit[1683]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1683 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:17.626000 audit[1683]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdf747a470 a2=0 a3=7ffdf747a45c items=0 ppid=1647 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:17.626000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 02:17:17.627600 kubelet[1647]: I0510 02:17:17.627565 1647 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 02:17:17.627765 kubelet[1647]: I0510 02:17:17.627740 1647 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 02:17:17.628003 kubelet[1647]: I0510 02:17:17.627979 1647 kubelet.go:2337] "Starting kubelet main sync loop" May 10 02:17:17.628251 kubelet[1647]: E0510 02:17:17.628215 1647 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 10 02:17:17.629000 audit[1684]: NETFILTER_CFG table=mangle:8 family=10 entries=1 op=nft_register_chain pid=1684 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:17.629000 audit[1684]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9a0d5510 a2=0 a3=7fff9a0d54fc items=0 ppid=1647 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:17.629000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 02:17:17.630000 audit[1682]: NETFILTER_CFG table=mangle:9 family=2 entries=1 op=nft_register_chain pid=1682 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:17.630000 audit[1682]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc393f1760 a2=0 a3=7ffc393f174c items=0 ppid=1647 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:17.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 02:17:17.631000 audit[1685]: NETFILTER_CFG table=nat:10 family=10 entries=2 op=nft_register_chain pid=1685 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:17.631000 audit[1685]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc80bc1d40 a2=0 a3=7ffc80bc1d2c items=0 ppid=1647 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:17.631000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 02:17:17.633000 audit[1687]: NETFILTER_CFG table=filter:11 family=10 entries=2 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:17.633000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff9dae0ef0 a2=0 a3=7fff9dae0edc items=0 ppid=1647 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:17.633000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 02:17:17.635000 audit[1686]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=1686 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:17.635000 audit[1686]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcdd7ebae0 a2=0 a3=7ffcdd7ebacc items=0 ppid=1647 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:17.635000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 02:17:17.636000 audit[1688]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1688 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:17.636000 audit[1688]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff94e1490 a2=0 a3=7ffff94e147c items=0 ppid=1647 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:17.636000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 02:17:17.689323 kubelet[1647]: E0510 02:17:17.689213 1647 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.230.14.182\" not found" May 10 02:17:17.790441 kubelet[1647]: E0510 02:17:17.790367 1647 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.230.14.182\" not found" May 10 02:17:17.832000 audit[1488]: USER_END pid=1488 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 02:17:17.832545 sudo[1488]: pam_unix(sudo:session): session closed for user root May 10 02:17:17.833000 audit[1488]: CRED_DISP pid=1488 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 02:17:17.891531 kubelet[1647]: E0510 02:17:17.891487 1647 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.230.14.182\" not found" May 10 02:17:17.979324 sshd[1484]: pam_unix(sshd:session): session closed for user core May 10 02:17:17.981000 audit[1484]: USER_END pid=1484 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 02:17:17.981000 audit[1484]: CRED_DISP pid=1484 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 02:17:17.984008 systemd-logind[1285]: Session 7 logged out. Waiting for processes to exit. May 10 02:17:17.984289 systemd[1]: sshd@6-10.230.14.182:22-139.178.68.195:40368.service: Deactivated successfully. May 10 02:17:17.985708 systemd[1]: session-7.scope: Deactivated successfully. May 10 02:17:17.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.230.14.182:22-139.178.68.195:40368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 02:17:17.987398 systemd-logind[1285]: Removed session 7. May 10 02:17:17.992460 kubelet[1647]: E0510 02:17:17.992400 1647 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.230.14.182\" not found" May 10 02:17:18.093537 kubelet[1647]: E0510 02:17:18.093406 1647 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.230.14.182\" not found" May 10 02:17:18.194358 kubelet[1647]: E0510 02:17:18.194189 1647 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.230.14.182\" not found" May 10 02:17:18.295098 kubelet[1647]: E0510 02:17:18.295023 1647 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.230.14.182\" not found" May 10 02:17:18.361914 kubelet[1647]: I0510 02:17:18.361855 1647 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 10 02:17:18.362509 kubelet[1647]: W0510 02:17:18.362482 1647 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 10 02:17:18.362702 kubelet[1647]: W0510 02:17:18.362482 1647 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 10 02:17:18.395361 kubelet[1647]: E0510 02:17:18.395306 1647 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.230.14.182\" not found" May 10 02:17:18.406598 kubelet[1647]: E0510 02:17:18.406566 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:18.496270 kubelet[1647]: E0510 02:17:18.495951 1647 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.230.14.182\" not found" May 10 02:17:18.596992 kubelet[1647]: E0510 02:17:18.596920 1647 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.230.14.182\" not found" May 10 02:17:18.697508 kubelet[1647]: E0510 02:17:18.697446 1647 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.230.14.182\" not found" May 10 02:17:18.798457 kubelet[1647]: E0510 02:17:18.798226 1647 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.230.14.182\" not found" May 10 02:17:18.899294 kubelet[1647]: E0510 02:17:18.899191 1647 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.230.14.182\" not found" May 10 02:17:19.000278 kubelet[1647]: I0510 02:17:19.000235 1647 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 10 02:17:19.000776 env[1294]: time="2025-05-10T02:17:19.000684160Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 10 02:17:19.001893 kubelet[1647]: I0510 02:17:19.001859 1647 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 10 02:17:19.407350 kubelet[1647]: I0510 02:17:19.407294 1647 apiserver.go:52] "Watching apiserver" May 10 02:17:19.407795 kubelet[1647]: E0510 02:17:19.407495 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:19.450332 kubelet[1647]: I0510 02:17:19.450288 1647 topology_manager.go:215] "Topology Admit Handler" podUID="b01d5cd3-49a7-406c-ba38-c11a19fca60f" podNamespace="calico-system" podName="calico-typha-6b45f5b84c-95vq9" May 10 02:17:19.450775 kubelet[1647]: I0510 02:17:19.450745 1647 topology_manager.go:215] "Topology Admit Handler" podUID="02a841c1-207b-46a9-ad09-03738472e3b5" podNamespace="calico-system" podName="csi-node-driver-kgclv" May 10 02:17:19.451163 kubelet[1647]: I0510 02:17:19.451118 1647 topology_manager.go:215] "Topology Admit Handler" podUID="8b5f5f40-0c54-4f08-8b47-ce0b305e4837" podNamespace="kube-system" podName="kube-proxy-fhkxs" May 10 02:17:19.451403 kubelet[1647]: I0510 02:17:19.451376 1647 topology_manager.go:215] "Topology Admit Handler" podUID="0bbeb636-b0eb-4730-9a44-9e6b77b51acb" podNamespace="calico-system" podName="calico-node-whdxq" May 10 02:17:19.453355 kubelet[1647]: E0510 02:17:19.453318 1647 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kgclv" podUID="02a841c1-207b-46a9-ad09-03738472e3b5" May 10 02:17:19.456273 kubelet[1647]: I0510 02:17:19.456246 1647 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 02:17:19.465751 kubelet[1647]: I0510 02:17:19.465723 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/8b5f5f40-0c54-4f08-8b47-ce0b305e4837-kube-proxy\") pod \"kube-proxy-fhkxs\" (UID: \"8b5f5f40-0c54-4f08-8b47-ce0b305e4837\") " pod="kube-system/kube-proxy-fhkxs" May 10 02:17:19.465935 kubelet[1647]: I0510 02:17:19.465902 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b01d5cd3-49a7-406c-ba38-c11a19fca60f-tigera-ca-bundle\") pod \"calico-typha-6b45f5b84c-95vq9\" (UID: \"b01d5cd3-49a7-406c-ba38-c11a19fca60f\") " pod="calico-system/calico-typha-6b45f5b84c-95vq9" May 10 02:17:19.466075 kubelet[1647]: I0510 02:17:19.466047 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/b01d5cd3-49a7-406c-ba38-c11a19fca60f-typha-certs\") pod \"calico-typha-6b45f5b84c-95vq9\" (UID: \"b01d5cd3-49a7-406c-ba38-c11a19fca60f\") " pod="calico-system/calico-typha-6b45f5b84c-95vq9" May 10 02:17:19.466222 kubelet[1647]: I0510 02:17:19.466178 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/0bbeb636-b0eb-4730-9a44-9e6b77b51acb-policysync\") pod \"calico-node-whdxq\" (UID: \"0bbeb636-b0eb-4730-9a44-9e6b77b51acb\") " pod="calico-system/calico-node-whdxq" May 10 02:17:19.466359 kubelet[1647]: I0510 02:17:19.466328 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/0bbeb636-b0eb-4730-9a44-9e6b77b51acb-node-certs\") pod \"calico-node-whdxq\" (UID: \"0bbeb636-b0eb-4730-9a44-9e6b77b51acb\") " pod="calico-system/calico-node-whdxq" May 10 02:17:19.466525 kubelet[1647]: I0510 02:17:19.466495 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/0bbeb636-b0eb-4730-9a44-9e6b77b51acb-var-run-calico\") pod \"calico-node-whdxq\" (UID: \"0bbeb636-b0eb-4730-9a44-9e6b77b51acb\") " pod="calico-system/calico-node-whdxq" May 10 02:17:19.466682 kubelet[1647]: I0510 02:17:19.466656 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/0bbeb636-b0eb-4730-9a44-9e6b77b51acb-cni-bin-dir\") pod \"calico-node-whdxq\" (UID: \"0bbeb636-b0eb-4730-9a44-9e6b77b51acb\") " pod="calico-system/calico-node-whdxq" May 10 02:17:19.466836 kubelet[1647]: I0510 02:17:19.466810 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/0bbeb636-b0eb-4730-9a44-9e6b77b51acb-cni-log-dir\") pod \"calico-node-whdxq\" (UID: \"0bbeb636-b0eb-4730-9a44-9e6b77b51acb\") " pod="calico-system/calico-node-whdxq" May 10 02:17:19.466982 kubelet[1647]: I0510 02:17:19.466954 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bgp2g\" (UniqueName: \"kubernetes.io/projected/b01d5cd3-49a7-406c-ba38-c11a19fca60f-kube-api-access-bgp2g\") pod \"calico-typha-6b45f5b84c-95vq9\" (UID: \"b01d5cd3-49a7-406c-ba38-c11a19fca60f\") " pod="calico-system/calico-typha-6b45f5b84c-95vq9" May 10 02:17:19.467109 kubelet[1647]: I0510 02:17:19.467082 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8b5f5f40-0c54-4f08-8b47-ce0b305e4837-xtables-lock\") pod \"kube-proxy-fhkxs\" (UID: \"8b5f5f40-0c54-4f08-8b47-ce0b305e4837\") " pod="kube-system/kube-proxy-fhkxs" May 10 02:17:19.467267 kubelet[1647]: I0510 02:17:19.467239 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8b5f5f40-0c54-4f08-8b47-ce0b305e4837-lib-modules\") pod \"kube-proxy-fhkxs\" (UID: \"8b5f5f40-0c54-4f08-8b47-ce0b305e4837\") " pod="kube-system/kube-proxy-fhkxs" May 10 02:17:19.467407 kubelet[1647]: I0510 02:17:19.467379 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8bhm8\" (UniqueName: \"kubernetes.io/projected/8b5f5f40-0c54-4f08-8b47-ce0b305e4837-kube-api-access-8bhm8\") pod \"kube-proxy-fhkxs\" (UID: \"8b5f5f40-0c54-4f08-8b47-ce0b305e4837\") " pod="kube-system/kube-proxy-fhkxs" May 10 02:17:19.467582 kubelet[1647]: I0510 02:17:19.467542 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0bbeb636-b0eb-4730-9a44-9e6b77b51acb-lib-modules\") pod \"calico-node-whdxq\" (UID: \"0bbeb636-b0eb-4730-9a44-9e6b77b51acb\") " pod="calico-system/calico-node-whdxq" May 10 02:17:19.467735 kubelet[1647]: I0510 02:17:19.467707 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0bbeb636-b0eb-4730-9a44-9e6b77b51acb-var-lib-calico\") pod \"calico-node-whdxq\" (UID: \"0bbeb636-b0eb-4730-9a44-9e6b77b51acb\") " pod="calico-system/calico-node-whdxq" May 10 02:17:19.467898 kubelet[1647]: I0510 02:17:19.467870 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/02a841c1-207b-46a9-ad09-03738472e3b5-socket-dir\") pod \"csi-node-driver-kgclv\" (UID: \"02a841c1-207b-46a9-ad09-03738472e3b5\") " pod="calico-system/csi-node-driver-kgclv" May 10 02:17:19.468044 kubelet[1647]: I0510 02:17:19.468017 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/02a841c1-207b-46a9-ad09-03738472e3b5-registration-dir\") pod \"csi-node-driver-kgclv\" (UID: \"02a841c1-207b-46a9-ad09-03738472e3b5\") " pod="calico-system/csi-node-driver-kgclv" May 10 02:17:19.468210 kubelet[1647]: I0510 02:17:19.468170 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5dkzf\" (UniqueName: \"kubernetes.io/projected/02a841c1-207b-46a9-ad09-03738472e3b5-kube-api-access-5dkzf\") pod \"csi-node-driver-kgclv\" (UID: \"02a841c1-207b-46a9-ad09-03738472e3b5\") " pod="calico-system/csi-node-driver-kgclv" May 10 02:17:19.468372 kubelet[1647]: I0510 02:17:19.468329 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0bbeb636-b0eb-4730-9a44-9e6b77b51acb-xtables-lock\") pod \"calico-node-whdxq\" (UID: \"0bbeb636-b0eb-4730-9a44-9e6b77b51acb\") " pod="calico-system/calico-node-whdxq" May 10 02:17:19.468554 kubelet[1647]: I0510 02:17:19.468529 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0bbeb636-b0eb-4730-9a44-9e6b77b51acb-tigera-ca-bundle\") pod \"calico-node-whdxq\" (UID: \"0bbeb636-b0eb-4730-9a44-9e6b77b51acb\") " pod="calico-system/calico-node-whdxq" May 10 02:17:19.468692 kubelet[1647]: I0510 02:17:19.468667 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/0bbeb636-b0eb-4730-9a44-9e6b77b51acb-cni-net-dir\") pod \"calico-node-whdxq\" (UID: \"0bbeb636-b0eb-4730-9a44-9e6b77b51acb\") " pod="calico-system/calico-node-whdxq" May 10 02:17:19.468849 kubelet[1647]: I0510 02:17:19.468799 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/0bbeb636-b0eb-4730-9a44-9e6b77b51acb-flexvol-driver-host\") pod \"calico-node-whdxq\" (UID: \"0bbeb636-b0eb-4730-9a44-9e6b77b51acb\") " pod="calico-system/calico-node-whdxq" May 10 02:17:19.469013 kubelet[1647]: I0510 02:17:19.468974 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6glg7\" (UniqueName: \"kubernetes.io/projected/0bbeb636-b0eb-4730-9a44-9e6b77b51acb-kube-api-access-6glg7\") pod \"calico-node-whdxq\" (UID: \"0bbeb636-b0eb-4730-9a44-9e6b77b51acb\") " pod="calico-system/calico-node-whdxq" May 10 02:17:19.469143 kubelet[1647]: I0510 02:17:19.469116 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/02a841c1-207b-46a9-ad09-03738472e3b5-varrun\") pod \"csi-node-driver-kgclv\" (UID: \"02a841c1-207b-46a9-ad09-03738472e3b5\") " pod="calico-system/csi-node-driver-kgclv" May 10 02:17:19.469308 kubelet[1647]: I0510 02:17:19.469281 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/02a841c1-207b-46a9-ad09-03738472e3b5-kubelet-dir\") pod \"csi-node-driver-kgclv\" (UID: \"02a841c1-207b-46a9-ad09-03738472e3b5\") " pod="calico-system/csi-node-driver-kgclv" May 10 02:17:19.576602 kubelet[1647]: E0510 02:17:19.576556 1647 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 02:17:19.577269 kubelet[1647]: W0510 02:17:19.577201 1647 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 02:17:19.577498 kubelet[1647]: E0510 02:17:19.577462 1647 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 02:17:19.582993 kubelet[1647]: E0510 02:17:19.582968 1647 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 02:17:19.583172 kubelet[1647]: W0510 02:17:19.583146 1647 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 02:17:19.583371 kubelet[1647]: E0510 02:17:19.583346 1647 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 02:17:19.584896 kubelet[1647]: E0510 02:17:19.584873 1647 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 02:17:19.585052 kubelet[1647]: W0510 02:17:19.585026 1647 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 02:17:19.587398 kubelet[1647]: E0510 02:17:19.587372 1647 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 02:17:19.588663 kubelet[1647]: E0510 02:17:19.588632 1647 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 02:17:19.588818 kubelet[1647]: W0510 02:17:19.588792 1647 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 02:17:19.588982 kubelet[1647]: E0510 02:17:19.588957 1647 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 02:17:19.618356 kubelet[1647]: E0510 02:17:19.618313 1647 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 02:17:19.618610 kubelet[1647]: W0510 02:17:19.618582 1647 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 02:17:19.618773 kubelet[1647]: E0510 02:17:19.618746 1647 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 02:17:19.626782 kubelet[1647]: E0510 02:17:19.626756 1647 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 02:17:19.626926 kubelet[1647]: W0510 02:17:19.626898 1647 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 02:17:19.631741 kubelet[1647]: E0510 02:17:19.631712 1647 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 02:17:19.636156 kubelet[1647]: E0510 02:17:19.636128 1647 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 02:17:19.636277 kubelet[1647]: W0510 02:17:19.636152 1647 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 02:17:19.636277 kubelet[1647]: E0510 02:17:19.636178 1647 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 02:17:19.637615 kubelet[1647]: E0510 02:17:19.637535 1647 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 02:17:19.637615 kubelet[1647]: W0510 02:17:19.637558 1647 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 02:17:19.637615 kubelet[1647]: E0510 02:17:19.637575 1647 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 02:17:19.759257 env[1294]: time="2025-05-10T02:17:19.758878844Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-whdxq,Uid:0bbeb636-b0eb-4730-9a44-9e6b77b51acb,Namespace:calico-system,Attempt:0,}" May 10 02:17:19.759257 env[1294]: time="2025-05-10T02:17:19.758869216Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fhkxs,Uid:8b5f5f40-0c54-4f08-8b47-ce0b305e4837,Namespace:kube-system,Attempt:0,}" May 10 02:17:19.773847 env[1294]: time="2025-05-10T02:17:19.773783146Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6b45f5b84c-95vq9,Uid:b01d5cd3-49a7-406c-ba38-c11a19fca60f,Namespace:calico-system,Attempt:0,}" May 10 02:17:20.408662 kubelet[1647]: E0510 02:17:20.408557 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:20.777466 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2171037382.mount: Deactivated successfully. May 10 02:17:20.786357 env[1294]: time="2025-05-10T02:17:20.786305137Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:20.789453 env[1294]: time="2025-05-10T02:17:20.789393957Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:20.792251 env[1294]: time="2025-05-10T02:17:20.792175464Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:20.793396 env[1294]: time="2025-05-10T02:17:20.793357143Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:20.795564 env[1294]: time="2025-05-10T02:17:20.795519005Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:20.797571 env[1294]: time="2025-05-10T02:17:20.797535761Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:20.798801 env[1294]: time="2025-05-10T02:17:20.798761221Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:20.802884 env[1294]: time="2025-05-10T02:17:20.802842807Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:20.816845 env[1294]: time="2025-05-10T02:17:20.816781814Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:20.818628 env[1294]: time="2025-05-10T02:17:20.818593549Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:20.819742 env[1294]: time="2025-05-10T02:17:20.819698011Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:20.824208 env[1294]: time="2025-05-10T02:17:20.824156196Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:20.859859 env[1294]: time="2025-05-10T02:17:20.857217328Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 02:17:20.859859 env[1294]: time="2025-05-10T02:17:20.857326610Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 02:17:20.859859 env[1294]: time="2025-05-10T02:17:20.857375981Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 02:17:20.859859 env[1294]: time="2025-05-10T02:17:20.857798935Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6f8d64c3ffa47528016b2c5965b0a0eb48c4ff6d9945c264644335df7b512462 pid=1719 runtime=io.containerd.runc.v2 May 10 02:17:20.863782 env[1294]: time="2025-05-10T02:17:20.863385305Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 02:17:20.863782 env[1294]: time="2025-05-10T02:17:20.863480845Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 02:17:20.863782 env[1294]: time="2025-05-10T02:17:20.863500207Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 02:17:20.864033 env[1294]: time="2025-05-10T02:17:20.863928565Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/606cbdaabe4e15109c0e6d74553ee167fc3dd47f9057281f46a01d3378681dfe pid=1725 runtime=io.containerd.runc.v2 May 10 02:17:20.896777 env[1294]: time="2025-05-10T02:17:20.894762199Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 02:17:20.896777 env[1294]: time="2025-05-10T02:17:20.894828321Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 02:17:20.896777 env[1294]: time="2025-05-10T02:17:20.894846566Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 02:17:20.896777 env[1294]: time="2025-05-10T02:17:20.895087253Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8ed634055a2c0841d13b7b505e7346544d4800e1abfb1a90e0901ada2e2e9ed5 pid=1766 runtime=io.containerd.runc.v2 May 10 02:17:20.977902 env[1294]: time="2025-05-10T02:17:20.977824357Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-whdxq,Uid:0bbeb636-b0eb-4730-9a44-9e6b77b51acb,Namespace:calico-system,Attempt:0,} returns sandbox id \"606cbdaabe4e15109c0e6d74553ee167fc3dd47f9057281f46a01d3378681dfe\"" May 10 02:17:20.983599 env[1294]: time="2025-05-10T02:17:20.983553772Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fhkxs,Uid:8b5f5f40-0c54-4f08-8b47-ce0b305e4837,Namespace:kube-system,Attempt:0,} returns sandbox id \"6f8d64c3ffa47528016b2c5965b0a0eb48c4ff6d9945c264644335df7b512462\"" May 10 02:17:20.989501 env[1294]: time="2025-05-10T02:17:20.989464225Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 10 02:17:21.057546 env[1294]: time="2025-05-10T02:17:21.056507181Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6b45f5b84c-95vq9,Uid:b01d5cd3-49a7-406c-ba38-c11a19fca60f,Namespace:calico-system,Attempt:0,} returns sandbox id \"8ed634055a2c0841d13b7b505e7346544d4800e1abfb1a90e0901ada2e2e9ed5\"" May 10 02:17:21.409676 kubelet[1647]: E0510 02:17:21.409610 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:21.631766 kubelet[1647]: E0510 02:17:21.631698 1647 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kgclv" podUID="02a841c1-207b-46a9-ad09-03738472e3b5" May 10 02:17:22.411307 kubelet[1647]: E0510 02:17:22.411164 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:22.588498 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount519336635.mount: Deactivated successfully. May 10 02:17:22.807203 env[1294]: time="2025-05-10T02:17:22.806745730Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:22.810309 env[1294]: time="2025-05-10T02:17:22.810276099Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:22.813250 env[1294]: time="2025-05-10T02:17:22.811829844Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:22.815240 env[1294]: time="2025-05-10T02:17:22.815148802Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:22.817765 env[1294]: time="2025-05-10T02:17:22.817724046Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 10 02:17:22.819921 env[1294]: time="2025-05-10T02:17:22.819732806Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 10 02:17:22.822695 env[1294]: time="2025-05-10T02:17:22.822656508Z" level=info msg="CreateContainer within sandbox \"606cbdaabe4e15109c0e6d74553ee167fc3dd47f9057281f46a01d3378681dfe\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 02:17:22.840234 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2184414411.mount: Deactivated successfully. May 10 02:17:22.846734 env[1294]: time="2025-05-10T02:17:22.846658311Z" level=info msg="CreateContainer within sandbox \"606cbdaabe4e15109c0e6d74553ee167fc3dd47f9057281f46a01d3378681dfe\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"6b83d721b5115d149c3ad8d07080d5f3d43420d4e1a049c96d188dad78dc4cba\"" May 10 02:17:22.848157 env[1294]: time="2025-05-10T02:17:22.848109556Z" level=info msg="StartContainer for \"6b83d721b5115d149c3ad8d07080d5f3d43420d4e1a049c96d188dad78dc4cba\"" May 10 02:17:22.945455 env[1294]: time="2025-05-10T02:17:22.943055879Z" level=info msg="StartContainer for \"6b83d721b5115d149c3ad8d07080d5f3d43420d4e1a049c96d188dad78dc4cba\" returns successfully" May 10 02:17:23.038390 env[1294]: time="2025-05-10T02:17:23.038304323Z" level=info msg="shim disconnected" id=6b83d721b5115d149c3ad8d07080d5f3d43420d4e1a049c96d188dad78dc4cba May 10 02:17:23.038390 env[1294]: time="2025-05-10T02:17:23.038381771Z" level=warning msg="cleaning up after shim disconnected" id=6b83d721b5115d149c3ad8d07080d5f3d43420d4e1a049c96d188dad78dc4cba namespace=k8s.io May 10 02:17:23.038390 env[1294]: time="2025-05-10T02:17:23.038402203Z" level=info msg="cleaning up dead shim" May 10 02:17:23.051575 env[1294]: time="2025-05-10T02:17:23.051527560Z" level=warning msg="cleanup warnings time=\"2025-05-10T02:17:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1887 runtime=io.containerd.runc.v2\n" May 10 02:17:23.412005 kubelet[1647]: E0510 02:17:23.411905 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:23.589020 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6b83d721b5115d149c3ad8d07080d5f3d43420d4e1a049c96d188dad78dc4cba-rootfs.mount: Deactivated successfully. May 10 02:17:23.631267 kubelet[1647]: E0510 02:17:23.629068 1647 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kgclv" podUID="02a841c1-207b-46a9-ad09-03738472e3b5" May 10 02:17:24.412798 kubelet[1647]: E0510 02:17:24.412709 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:24.656249 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3261487799.mount: Deactivated successfully. May 10 02:17:25.413084 kubelet[1647]: E0510 02:17:25.413017 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:25.630441 kubelet[1647]: E0510 02:17:25.630354 1647 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kgclv" podUID="02a841c1-207b-46a9-ad09-03738472e3b5" May 10 02:17:25.687387 env[1294]: time="2025-05-10T02:17:25.687254424Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:25.690073 env[1294]: time="2025-05-10T02:17:25.690037720Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:25.692163 env[1294]: time="2025-05-10T02:17:25.692112910Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:25.693750 env[1294]: time="2025-05-10T02:17:25.693710130Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:25.694580 env[1294]: time="2025-05-10T02:17:25.694533459Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b\"" May 10 02:17:25.696715 env[1294]: time="2025-05-10T02:17:25.696674932Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 10 02:17:25.697844 env[1294]: time="2025-05-10T02:17:25.697806189Z" level=info msg="CreateContainer within sandbox \"6f8d64c3ffa47528016b2c5965b0a0eb48c4ff6d9945c264644335df7b512462\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 10 02:17:25.714770 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1388199617.mount: Deactivated successfully. May 10 02:17:25.723489 env[1294]: time="2025-05-10T02:17:25.723394569Z" level=info msg="CreateContainer within sandbox \"6f8d64c3ffa47528016b2c5965b0a0eb48c4ff6d9945c264644335df7b512462\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"41f0ab73beff5e2fa695ddbf971f829cc1c718fd185b4a8d6404f9244129764e\"" May 10 02:17:25.724259 env[1294]: time="2025-05-10T02:17:25.724221192Z" level=info msg="StartContainer for \"41f0ab73beff5e2fa695ddbf971f829cc1c718fd185b4a8d6404f9244129764e\"" May 10 02:17:25.824393 env[1294]: time="2025-05-10T02:17:25.824320420Z" level=info msg="StartContainer for \"41f0ab73beff5e2fa695ddbf971f829cc1c718fd185b4a8d6404f9244129764e\" returns successfully" May 10 02:17:25.900307 kernel: kauditd_printk_skb: 50 callbacks suppressed May 10 02:17:25.900561 kernel: audit: type=1325 audit(1746843445.893:210): table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1964 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:25.893000 audit[1964]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1964 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:25.895000 audit[1965]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1965 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:25.905468 kernel: audit: type=1325 audit(1746843445.895:211): table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1965 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:25.895000 audit[1965]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3b054e40 a2=0 a3=7ffc3b054e2c items=0 ppid=1923 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:25.913445 kernel: audit: type=1300 audit(1746843445.895:211): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3b054e40 a2=0 a3=7ffc3b054e2c items=0 ppid=1923 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:25.895000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 02:17:25.895000 audit[1966]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1966 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:25.921509 kernel: audit: type=1327 audit(1746843445.895:211): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 02:17:25.921618 kernel: audit: type=1325 audit(1746843445.895:212): table=nat:16 family=10 entries=1 op=nft_register_chain pid=1966 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:25.921671 kernel: audit: type=1300 audit(1746843445.895:212): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd2921480 a2=0 a3=7ffdd292146c items=0 ppid=1923 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:25.895000 audit[1966]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd2921480 a2=0 a3=7ffdd292146c items=0 ppid=1923 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:25.895000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 02:17:25.933561 kernel: audit: type=1327 audit(1746843445.895:212): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 02:17:25.933671 kernel: audit: type=1325 audit(1746843445.900:213): table=filter:17 family=10 entries=1 op=nft_register_chain pid=1967 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:25.900000 audit[1967]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=1967 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:25.900000 audit[1967]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6c2e0ed0 a2=0 a3=7ffd6c2e0ebc items=0 ppid=1923 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:25.945512 kernel: audit: type=1300 audit(1746843445.900:213): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6c2e0ed0 a2=0 a3=7ffd6c2e0ebc items=0 ppid=1923 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:25.900000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 02:17:25.949893 kernel: audit: type=1327 audit(1746843445.900:213): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 02:17:25.893000 audit[1964]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc6c2f93e0 a2=0 a3=7ffc6c2f93cc items=0 ppid=1923 pid=1964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:25.893000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 02:17:25.913000 audit[1968]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1968 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:25.913000 audit[1968]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd64fa41e0 a2=0 a3=7ffd64fa41cc items=0 ppid=1923 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:25.913000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 02:17:25.917000 audit[1969]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1969 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:25.917000 audit[1969]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd13050030 a2=0 a3=7ffd1305001c items=0 ppid=1923 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:25.917000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 02:17:26.004000 audit[1970]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1970 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:26.004000 audit[1970]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe41d43a20 a2=0 a3=7ffe41d43a0c items=0 ppid=1923 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.004000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 02:17:26.008000 audit[1972]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1972 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:26.008000 audit[1972]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd3a4f6380 a2=0 a3=7ffd3a4f636c items=0 ppid=1923 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.008000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 10 02:17:26.014000 audit[1975]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1975 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:26.014000 audit[1975]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd854f1630 a2=0 a3=7ffd854f161c items=0 ppid=1923 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.014000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 10 02:17:26.016000 audit[1976]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1976 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:26.016000 audit[1976]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3fa9c670 a2=0 a3=7ffd3fa9c65c items=0 ppid=1923 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.016000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 02:17:26.020000 audit[1978]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1978 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:26.020000 audit[1978]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdb73c77a0 a2=0 a3=7ffdb73c778c items=0 ppid=1923 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.020000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 02:17:26.023000 audit[1979]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1979 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:26.023000 audit[1979]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5e5acbf0 a2=0 a3=7ffd5e5acbdc items=0 ppid=1923 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.023000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 02:17:26.027000 audit[1981]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1981 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:26.027000 audit[1981]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe6b721620 a2=0 a3=7ffe6b72160c items=0 ppid=1923 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.027000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 02:17:26.032000 audit[1984]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1984 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:26.032000 audit[1984]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdabf6fa20 a2=0 a3=7ffdabf6fa0c items=0 ppid=1923 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.032000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 10 02:17:26.034000 audit[1985]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1985 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:26.034000 audit[1985]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7d5d8550 a2=0 a3=7ffe7d5d853c items=0 ppid=1923 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.034000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 02:17:26.037000 audit[1987]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1987 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:26.037000 audit[1987]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcde0d5b10 a2=0 a3=7ffcde0d5afc items=0 ppid=1923 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.037000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 02:17:26.039000 audit[1988]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1988 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:26.039000 audit[1988]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc6e9930b0 a2=0 a3=7ffc6e99309c items=0 ppid=1923 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.039000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 02:17:26.044000 audit[1990]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1990 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:26.044000 audit[1990]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff671f3fc0 a2=0 a3=7fff671f3fac items=0 ppid=1923 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.044000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 02:17:26.049000 audit[1993]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1993 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:26.049000 audit[1993]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd32dfc1a0 a2=0 a3=7ffd32dfc18c items=0 ppid=1923 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.049000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 02:17:26.054000 audit[1996]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1996 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:26.054000 audit[1996]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf6902e70 a2=0 a3=7ffdf6902e5c items=0 ppid=1923 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.054000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 02:17:26.056000 audit[1997]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1997 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:26.056000 audit[1997]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe7cd453e0 a2=0 a3=7ffe7cd453cc items=0 ppid=1923 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.056000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 02:17:26.060000 audit[1999]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1999 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:26.060000 audit[1999]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff731c7a10 a2=0 a3=7fff731c79fc items=0 ppid=1923 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.060000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 02:17:26.093000 audit[2005]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2005 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:26.093000 audit[2005]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc9c13adb0 a2=0 a3=7ffc9c13ad9c items=0 ppid=1923 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.093000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 02:17:26.095000 audit[2006]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2006 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:26.095000 audit[2006]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcdef39e00 a2=0 a3=7ffcdef39dec items=0 ppid=1923 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.095000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 02:17:26.099000 audit[2008]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2008 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 02:17:26.099000 audit[2008]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcb9440890 a2=0 a3=7ffcb944087c items=0 ppid=1923 pid=2008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.099000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 02:17:26.131000 audit[2014]: NETFILTER_CFG table=filter:39 family=2 entries=6 op=nft_register_rule pid=2014 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:26.131000 audit[2014]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff5cf8d290 a2=0 a3=7fff5cf8d27c items=0 ppid=1923 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.131000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:26.162000 audit[2014]: NETFILTER_CFG table=nat:40 family=2 entries=58 op=nft_register_chain pid=2014 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:26.162000 audit[2014]: SYSCALL arch=c000003e syscall=46 success=yes exit=27364 a0=3 a1=7fff5cf8d290 a2=0 a3=7fff5cf8d27c items=0 ppid=1923 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.162000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:26.179000 audit[2023]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2023 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:26.179000 audit[2023]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc8cdd6a80 a2=0 a3=7ffc8cdd6a6c items=0 ppid=1923 pid=2023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.179000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 02:17:26.184000 audit[2025]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2025 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:26.184000 audit[2025]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd8ba17720 a2=0 a3=7ffd8ba1770c items=0 ppid=1923 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.184000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 10 02:17:26.190000 audit[2028]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2028 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:26.190000 audit[2028]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff0aaf6ed0 a2=0 a3=7fff0aaf6ebc items=0 ppid=1923 pid=2028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.190000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 10 02:17:26.192000 audit[2029]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2029 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:26.192000 audit[2029]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd086e1630 a2=0 a3=7ffd086e161c items=0 ppid=1923 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.192000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 02:17:26.196000 audit[2031]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2031 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:26.196000 audit[2031]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd98121930 a2=0 a3=7ffd9812191c items=0 ppid=1923 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.196000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 02:17:26.200000 audit[2032]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2032 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:26.200000 audit[2032]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb129ecc0 a2=0 a3=7ffdb129ecac items=0 ppid=1923 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.200000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 02:17:26.204000 audit[2034]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2034 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:26.204000 audit[2034]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd12b3bb20 a2=0 a3=7ffd12b3bb0c items=0 ppid=1923 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.204000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 10 02:17:26.211000 audit[2037]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2037 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:26.211000 audit[2037]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe6309f5f0 a2=0 a3=7ffe6309f5dc items=0 ppid=1923 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.211000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 02:17:26.213000 audit[2038]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2038 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:26.213000 audit[2038]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4f7c79b0 a2=0 a3=7fff4f7c799c items=0 ppid=1923 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.213000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 02:17:26.220000 audit[2040]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2040 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:26.220000 audit[2040]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd4ccc5460 a2=0 a3=7ffd4ccc544c items=0 ppid=1923 pid=2040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.220000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 02:17:26.222000 audit[2041]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2041 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:26.222000 audit[2041]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff77c36e90 a2=0 a3=7fff77c36e7c items=0 ppid=1923 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.222000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 02:17:26.226000 audit[2043]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2043 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:26.226000 audit[2043]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe31506a00 a2=0 a3=7ffe315069ec items=0 ppid=1923 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.226000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 02:17:26.231000 audit[2046]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2046 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:26.231000 audit[2046]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcacde1110 a2=0 a3=7ffcacde10fc items=0 ppid=1923 pid=2046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.231000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 02:17:26.237000 audit[2049]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2049 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:26.237000 audit[2049]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff0899fc20 a2=0 a3=7fff0899fc0c items=0 ppid=1923 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.237000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 10 02:17:26.239000 audit[2050]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2050 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:26.239000 audit[2050]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffedbf9a210 a2=0 a3=7ffedbf9a1fc items=0 ppid=1923 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.239000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 02:17:26.244000 audit[2052]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2052 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:26.244000 audit[2052]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcf0d29f60 a2=0 a3=7ffcf0d29f4c items=0 ppid=1923 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.244000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 02:17:26.249000 audit[2055]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2055 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:26.249000 audit[2055]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcc3d42100 a2=0 a3=7ffcc3d420ec items=0 ppid=1923 pid=2055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.249000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 02:17:26.251000 audit[2056]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2056 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:26.251000 audit[2056]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcb30d8f0 a2=0 a3=7fffcb30d8dc items=0 ppid=1923 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.251000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 02:17:26.254000 audit[2058]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2058 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:26.254000 audit[2058]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe8eec6130 a2=0 a3=7ffe8eec611c items=0 ppid=1923 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.254000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 02:17:26.256000 audit[2059]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2059 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:26.256000 audit[2059]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4e5b6c10 a2=0 a3=7ffe4e5b6bfc items=0 ppid=1923 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.256000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 02:17:26.260000 audit[2061]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2061 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:26.260000 audit[2061]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff4d526ae0 a2=0 a3=7fff4d526acc items=0 ppid=1923 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.260000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 02:17:26.265000 audit[2064]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2064 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 02:17:26.265000 audit[2064]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd44b90280 a2=0 a3=7ffd44b9026c items=0 ppid=1923 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.265000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 02:17:26.269000 audit[2066]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2066 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 02:17:26.269000 audit[2066]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffcf469d4e0 a2=0 a3=7ffcf469d4cc items=0 ppid=1923 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.269000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:26.270000 audit[2066]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2066 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 02:17:26.270000 audit[2066]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffcf469d4e0 a2=0 a3=7ffcf469d4cc items=0 ppid=1923 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:26.270000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:26.413791 kubelet[1647]: E0510 02:17:26.413700 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:26.683710 kubelet[1647]: I0510 02:17:26.683567 1647 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-fhkxs" podStartSLOduration=4.978052785 podStartE2EDuration="9.683450452s" podCreationTimestamp="2025-05-10 02:17:17 +0000 UTC" firstStartedPulling="2025-05-10 02:17:20.990255168 +0000 UTC m=+4.211919496" lastFinishedPulling="2025-05-10 02:17:25.695652835 +0000 UTC m=+8.917317163" observedRunningTime="2025-05-10 02:17:26.683462228 +0000 UTC m=+9.905126576" watchObservedRunningTime="2025-05-10 02:17:26.683450452 +0000 UTC m=+9.905114790" May 10 02:17:27.414330 kubelet[1647]: E0510 02:17:27.414208 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:27.631494 kubelet[1647]: E0510 02:17:27.630770 1647 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kgclv" podUID="02a841c1-207b-46a9-ad09-03738472e3b5" May 10 02:17:28.415346 kubelet[1647]: E0510 02:17:28.415248 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:29.188054 env[1294]: time="2025-05-10T02:17:29.187901953Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:29.191535 env[1294]: time="2025-05-10T02:17:29.191467360Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:29.194038 env[1294]: time="2025-05-10T02:17:29.193993552Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:29.196887 env[1294]: time="2025-05-10T02:17:29.196846783Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:29.197925 env[1294]: time="2025-05-10T02:17:29.197883237Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 10 02:17:29.202076 env[1294]: time="2025-05-10T02:17:29.201911012Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 10 02:17:29.224350 env[1294]: time="2025-05-10T02:17:29.224296443Z" level=info msg="CreateContainer within sandbox \"8ed634055a2c0841d13b7b505e7346544d4800e1abfb1a90e0901ada2e2e9ed5\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 10 02:17:29.243169 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2573619602.mount: Deactivated successfully. May 10 02:17:29.248674 env[1294]: time="2025-05-10T02:17:29.248618274Z" level=info msg="CreateContainer within sandbox \"8ed634055a2c0841d13b7b505e7346544d4800e1abfb1a90e0901ada2e2e9ed5\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"b5922518d014285b07fcf49f91ceff4f1260340aa2debcf47ec11eeaa1c746f9\"" May 10 02:17:29.249912 env[1294]: time="2025-05-10T02:17:29.249876237Z" level=info msg="StartContainer for \"b5922518d014285b07fcf49f91ceff4f1260340aa2debcf47ec11eeaa1c746f9\"" May 10 02:17:29.372909 env[1294]: time="2025-05-10T02:17:29.372831071Z" level=info msg="StartContainer for \"b5922518d014285b07fcf49f91ceff4f1260340aa2debcf47ec11eeaa1c746f9\" returns successfully" May 10 02:17:29.416074 kubelet[1647]: E0510 02:17:29.415985 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:29.631085 kubelet[1647]: E0510 02:17:29.630556 1647 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kgclv" podUID="02a841c1-207b-46a9-ad09-03738472e3b5" May 10 02:17:30.417520 kubelet[1647]: E0510 02:17:30.417232 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:30.688360 kubelet[1647]: I0510 02:17:30.687803 1647 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 02:17:31.418337 kubelet[1647]: E0510 02:17:31.418272 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:31.631056 kubelet[1647]: E0510 02:17:31.629457 1647 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kgclv" podUID="02a841c1-207b-46a9-ad09-03738472e3b5" May 10 02:17:31.650989 kernel: kauditd_printk_skb: 143 callbacks suppressed May 10 02:17:31.651245 kernel: audit: type=1325 audit(1746843451.642:261): table=filter:65 family=2 entries=10 op=nft_register_rule pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:31.642000 audit[2109]: NETFILTER_CFG table=filter:65 family=2 entries=10 op=nft_register_rule pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:31.642000 audit[2109]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe96816220 a2=0 a3=7ffe9681620c items=0 ppid=1923 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:31.642000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:31.666838 kernel: audit: type=1300 audit(1746843451.642:261): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe96816220 a2=0 a3=7ffe9681620c items=0 ppid=1923 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:31.666960 kernel: audit: type=1327 audit(1746843451.642:261): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:31.667025 kernel: audit: type=1325 audit(1746843451.664:262): table=nat:66 family=2 entries=38 op=nft_register_chain pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:31.664000 audit[2109]: NETFILTER_CFG table=nat:66 family=2 entries=38 op=nft_register_chain pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:31.664000 audit[2109]: SYSCALL arch=c000003e syscall=46 success=yes exit=12356 a0=3 a1=7ffe96816220 a2=0 a3=7ffe9681620c items=0 ppid=1923 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:31.677083 kernel: audit: type=1300 audit(1746843451.664:262): arch=c000003e syscall=46 success=yes exit=12356 a0=3 a1=7ffe96816220 a2=0 a3=7ffe9681620c items=0 ppid=1923 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:31.664000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:31.682485 kernel: audit: type=1327 audit(1746843451.664:262): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:31.700000 audit[2111]: NETFILTER_CFG table=filter:67 family=2 entries=10 op=nft_register_rule pid=2111 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:31.700000 audit[2111]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd41398ad0 a2=0 a3=7ffd41398abc items=0 ppid=1923 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:31.713052 kernel: audit: type=1325 audit(1746843451.700:263): table=filter:67 family=2 entries=10 op=nft_register_rule pid=2111 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:31.713162 kernel: audit: type=1300 audit(1746843451.700:263): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd41398ad0 a2=0 a3=7ffd41398abc items=0 ppid=1923 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:31.700000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:31.714000 audit[2111]: NETFILTER_CFG table=nat:68 family=2 entries=38 op=nft_unregister_chain pid=2111 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:31.723098 kernel: audit: type=1327 audit(1746843451.700:263): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:31.723177 kernel: audit: type=1325 audit(1746843451.714:264): table=nat:68 family=2 entries=38 op=nft_unregister_chain pid=2111 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:31.714000 audit[2111]: SYSCALL arch=c000003e syscall=46 success=yes exit=10596 a0=3 a1=7ffd41398ad0 a2=0 a3=7ffd41398abc items=0 ppid=1923 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:31.714000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:32.227905 update_engine[1287]: I0510 02:17:32.227737 1287 update_attempter.cc:509] Updating boot flags... May 10 02:17:32.422186 kubelet[1647]: E0510 02:17:32.422080 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:32.879000 audit[2127]: NETFILTER_CFG table=filter:69 family=2 entries=10 op=nft_register_rule pid=2127 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:32.879000 audit[2127]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff2a5272d0 a2=0 a3=7fff2a5272bc items=0 ppid=1923 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:32.879000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:32.885000 audit[2127]: NETFILTER_CFG table=nat:70 family=2 entries=34 op=nft_register_rule pid=2127 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:32.885000 audit[2127]: SYSCALL arch=c000003e syscall=46 success=yes exit=10468 a0=3 a1=7fff2a5272d0 a2=0 a3=7fff2a5272bc items=0 ppid=1923 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:32.885000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:33.423223 kubelet[1647]: E0510 02:17:33.423129 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:33.629565 kubelet[1647]: E0510 02:17:33.629168 1647 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kgclv" podUID="02a841c1-207b-46a9-ad09-03738472e3b5" May 10 02:17:33.898000 audit[2129]: NETFILTER_CFG table=filter:71 family=2 entries=10 op=nft_register_rule pid=2129 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:33.898000 audit[2129]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff94209d10 a2=0 a3=7fff94209cfc items=0 ppid=1923 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:33.898000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:33.906000 audit[2129]: NETFILTER_CFG table=nat:72 family=2 entries=34 op=nft_register_rule pid=2129 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:33.906000 audit[2129]: SYSCALL arch=c000003e syscall=46 success=yes exit=10468 a0=3 a1=7fff94209d10 a2=0 a3=7fff94209cfc items=0 ppid=1923 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:33.906000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:34.424356 kubelet[1647]: E0510 02:17:34.424264 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:35.425471 kubelet[1647]: E0510 02:17:35.425422 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:35.593587 env[1294]: time="2025-05-10T02:17:35.593449756Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:35.596394 env[1294]: time="2025-05-10T02:17:35.596354265Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:35.598403 env[1294]: time="2025-05-10T02:17:35.598365633Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:35.600314 env[1294]: time="2025-05-10T02:17:35.600275595Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:35.602182 env[1294]: time="2025-05-10T02:17:35.601311115Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 10 02:17:35.605337 env[1294]: time="2025-05-10T02:17:35.605280531Z" level=info msg="CreateContainer within sandbox \"606cbdaabe4e15109c0e6d74553ee167fc3dd47f9057281f46a01d3378681dfe\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 02:17:35.625719 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2424928363.mount: Deactivated successfully. May 10 02:17:35.631732 kubelet[1647]: E0510 02:17:35.631244 1647 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kgclv" podUID="02a841c1-207b-46a9-ad09-03738472e3b5" May 10 02:17:35.641324 env[1294]: time="2025-05-10T02:17:35.641254747Z" level=info msg="CreateContainer within sandbox \"606cbdaabe4e15109c0e6d74553ee167fc3dd47f9057281f46a01d3378681dfe\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7a91287ac01f883ad14727fffa4cc38038a47584e1c4c6cdf5449f1e7fe7612c\"" May 10 02:17:35.642646 env[1294]: time="2025-05-10T02:17:35.642605924Z" level=info msg="StartContainer for \"7a91287ac01f883ad14727fffa4cc38038a47584e1c4c6cdf5449f1e7fe7612c\"" May 10 02:17:35.739435 env[1294]: time="2025-05-10T02:17:35.733903371Z" level=info msg="StartContainer for \"7a91287ac01f883ad14727fffa4cc38038a47584e1c4c6cdf5449f1e7fe7612c\" returns successfully" May 10 02:17:36.426096 kubelet[1647]: E0510 02:17:36.426034 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:36.746737 kubelet[1647]: I0510 02:17:36.733265 1647 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-6b45f5b84c-95vq9" podStartSLOduration=12.593179969 podStartE2EDuration="20.733245363s" podCreationTimestamp="2025-05-10 02:17:16 +0000 UTC" firstStartedPulling="2025-05-10 02:17:21.059379117 +0000 UTC m=+4.281043450" lastFinishedPulling="2025-05-10 02:17:29.199444495 +0000 UTC m=+12.421108844" observedRunningTime="2025-05-10 02:17:29.69499505 +0000 UTC m=+12.916659398" watchObservedRunningTime="2025-05-10 02:17:36.733245363 +0000 UTC m=+19.954909716" May 10 02:17:36.799163 env[1294]: time="2025-05-10T02:17:36.799059934Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 02:17:36.827894 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7a91287ac01f883ad14727fffa4cc38038a47584e1c4c6cdf5449f1e7fe7612c-rootfs.mount: Deactivated successfully. May 10 02:17:36.870785 kubelet[1647]: I0510 02:17:36.870737 1647 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 10 02:17:36.955716 env[1294]: time="2025-05-10T02:17:36.955637859Z" level=info msg="shim disconnected" id=7a91287ac01f883ad14727fffa4cc38038a47584e1c4c6cdf5449f1e7fe7612c May 10 02:17:36.955716 env[1294]: time="2025-05-10T02:17:36.955713847Z" level=warning msg="cleaning up after shim disconnected" id=7a91287ac01f883ad14727fffa4cc38038a47584e1c4c6cdf5449f1e7fe7612c namespace=k8s.io May 10 02:17:36.956063 env[1294]: time="2025-05-10T02:17:36.955733528Z" level=info msg="cleaning up dead shim" May 10 02:17:36.969013 env[1294]: time="2025-05-10T02:17:36.968955938Z" level=warning msg="cleanup warnings time=\"2025-05-10T02:17:36Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2177 runtime=io.containerd.runc.v2\n" May 10 02:17:37.401107 kubelet[1647]: E0510 02:17:37.401048 1647 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:37.426710 kubelet[1647]: E0510 02:17:37.426681 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:37.634990 env[1294]: time="2025-05-10T02:17:37.634881474Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kgclv,Uid:02a841c1-207b-46a9-ad09-03738472e3b5,Namespace:calico-system,Attempt:0,}" May 10 02:17:37.711637 env[1294]: time="2025-05-10T02:17:37.711232189Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 10 02:17:37.752207 env[1294]: time="2025-05-10T02:17:37.752095702Z" level=error msg="Failed to destroy network for sandbox \"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 02:17:37.755469 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f-shm.mount: Deactivated successfully. May 10 02:17:37.757526 env[1294]: time="2025-05-10T02:17:37.757480608Z" level=error msg="encountered an error cleaning up failed sandbox \"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 02:17:37.757748 env[1294]: time="2025-05-10T02:17:37.757678321Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kgclv,Uid:02a841c1-207b-46a9-ad09-03738472e3b5,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 02:17:37.758471 kubelet[1647]: E0510 02:17:37.758285 1647 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 02:17:37.759292 kubelet[1647]: E0510 02:17:37.758687 1647 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kgclv" May 10 02:17:37.759292 kubelet[1647]: E0510 02:17:37.758780 1647 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kgclv" May 10 02:17:37.759292 kubelet[1647]: E0510 02:17:37.758884 1647 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-kgclv_calico-system(02a841c1-207b-46a9-ad09-03738472e3b5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-kgclv_calico-system(02a841c1-207b-46a9-ad09-03738472e3b5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kgclv" podUID="02a841c1-207b-46a9-ad09-03738472e3b5" May 10 02:17:38.322452 kubelet[1647]: I0510 02:17:38.322141 1647 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 02:17:38.362000 audit[2222]: NETFILTER_CFG table=filter:73 family=2 entries=9 op=nft_register_rule pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:38.366490 kernel: kauditd_printk_skb: 14 callbacks suppressed May 10 02:17:38.366627 kernel: audit: type=1325 audit(1746843458.362:269): table=filter:73 family=2 entries=9 op=nft_register_rule pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:38.362000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff0b4f33c0 a2=0 a3=7fff0b4f33ac items=0 ppid=1923 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:38.378879 kernel: audit: type=1300 audit(1746843458.362:269): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff0b4f33c0 a2=0 a3=7fff0b4f33ac items=0 ppid=1923 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:38.378990 kernel: audit: type=1327 audit(1746843458.362:269): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:38.362000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:38.382814 kernel: audit: type=1325 audit(1746843458.370:270): table=nat:74 family=2 entries=27 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:38.370000 audit[2222]: NETFILTER_CFG table=nat:74 family=2 entries=27 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:38.386834 kernel: audit: type=1300 audit(1746843458.370:270): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff0b4f33c0 a2=0 a3=7fff0b4f33ac items=0 ppid=1923 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:38.370000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff0b4f33c0 a2=0 a3=7fff0b4f33ac items=0 ppid=1923 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:38.370000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:38.398576 kernel: audit: type=1327 audit(1746843458.370:270): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:38.427594 kubelet[1647]: E0510 02:17:38.427507 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:38.714682 kubelet[1647]: I0510 02:17:38.714623 1647 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" May 10 02:17:38.717071 env[1294]: time="2025-05-10T02:17:38.717018398Z" level=info msg="StopPodSandbox for \"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f\"" May 10 02:17:38.753741 env[1294]: time="2025-05-10T02:17:38.753664301Z" level=error msg="StopPodSandbox for \"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f\" failed" error="failed to destroy network for sandbox \"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 02:17:38.754446 kubelet[1647]: E0510 02:17:38.754285 1647 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" May 10 02:17:38.754827 kubelet[1647]: E0510 02:17:38.754397 1647 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f"} May 10 02:17:38.754827 kubelet[1647]: E0510 02:17:38.754715 1647 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"02a841c1-207b-46a9-ad09-03738472e3b5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 02:17:38.754827 kubelet[1647]: E0510 02:17:38.754774 1647 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"02a841c1-207b-46a9-ad09-03738472e3b5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kgclv" podUID="02a841c1-207b-46a9-ad09-03738472e3b5" May 10 02:17:39.428573 kubelet[1647]: E0510 02:17:39.428502 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:40.428850 kubelet[1647]: E0510 02:17:40.428748 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:41.429441 kubelet[1647]: E0510 02:17:41.429335 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:41.657000 audit[2242]: NETFILTER_CFG table=filter:75 family=2 entries=8 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:41.668787 kernel: audit: type=1325 audit(1746843461.657:271): table=filter:75 family=2 entries=8 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:41.657000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdb0afbc60 a2=0 a3=7ffdb0afbc4c items=0 ppid=1923 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:41.685628 kernel: audit: type=1300 audit(1746843461.657:271): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdb0afbc60 a2=0 a3=7ffdb0afbc4c items=0 ppid=1923 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:41.685900 kernel: audit: type=1327 audit(1746843461.657:271): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:41.657000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:41.673000 audit[2242]: NETFILTER_CFG table=nat:76 family=2 entries=40 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:41.691551 kernel: audit: type=1325 audit(1746843461.673:272): table=nat:76 family=2 entries=40 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:41.673000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=13124 a0=3 a1=7ffdb0afbc60 a2=0 a3=7ffdb0afbc4c items=0 ppid=1923 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:41.673000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:41.721000 audit[2244]: NETFILTER_CFG table=filter:77 family=2 entries=8 op=nft_register_rule pid=2244 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:41.721000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcc21a7a60 a2=0 a3=7ffcc21a7a4c items=0 ppid=1923 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:41.721000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:41.726000 audit[2244]: NETFILTER_CFG table=nat:78 family=2 entries=40 op=nft_unregister_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:41.726000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=11364 a0=3 a1=7ffcc21a7a60 a2=0 a3=7ffcc21a7a4c items=0 ppid=1923 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:41.726000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:42.430208 kubelet[1647]: E0510 02:17:42.430089 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:43.010000 audit[2246]: NETFILTER_CFG table=filter:79 family=2 entries=8 op=nft_register_rule pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:43.010000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd3cd08ca0 a2=0 a3=7ffd3cd08c8c items=0 ppid=1923 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:43.010000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:43.016000 audit[2246]: NETFILTER_CFG table=nat:80 family=2 entries=36 op=nft_register_rule pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:17:43.016000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd3cd08ca0 a2=0 a3=7ffd3cd08c8c items=0 ppid=1923 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:43.016000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:17:43.430397 kubelet[1647]: E0510 02:17:43.430281 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:44.431520 kubelet[1647]: E0510 02:17:44.431370 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:44.840227 kubelet[1647]: I0510 02:17:44.839824 1647 topology_manager.go:215] "Topology Admit Handler" podUID="f9e49781-f94c-414e-a653-3b438954f981" podNamespace="default" podName="nginx-deployment-85f456d6dd-bwp85" May 10 02:17:44.854189 kubelet[1647]: I0510 02:17:44.854153 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d2whp\" (UniqueName: \"kubernetes.io/projected/f9e49781-f94c-414e-a653-3b438954f981-kube-api-access-d2whp\") pod \"nginx-deployment-85f456d6dd-bwp85\" (UID: \"f9e49781-f94c-414e-a653-3b438954f981\") " pod="default/nginx-deployment-85f456d6dd-bwp85" May 10 02:17:45.146884 env[1294]: time="2025-05-10T02:17:45.146819242Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-bwp85,Uid:f9e49781-f94c-414e-a653-3b438954f981,Namespace:default,Attempt:0,}" May 10 02:17:45.432477 kubelet[1647]: E0510 02:17:45.432007 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:45.494179 env[1294]: time="2025-05-10T02:17:45.494014388Z" level=error msg="Failed to destroy network for sandbox \"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 02:17:45.497457 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305-shm.mount: Deactivated successfully. May 10 02:17:45.500138 env[1294]: time="2025-05-10T02:17:45.499074532Z" level=error msg="encountered an error cleaning up failed sandbox \"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 02:17:45.500138 env[1294]: time="2025-05-10T02:17:45.499151562Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-bwp85,Uid:f9e49781-f94c-414e-a653-3b438954f981,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 02:17:45.500380 kubelet[1647]: E0510 02:17:45.499564 1647 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 02:17:45.500380 kubelet[1647]: E0510 02:17:45.499675 1647 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-bwp85" May 10 02:17:45.500380 kubelet[1647]: E0510 02:17:45.499736 1647 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-bwp85" May 10 02:17:45.500696 kubelet[1647]: E0510 02:17:45.499833 1647 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-bwp85_default(f9e49781-f94c-414e-a653-3b438954f981)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-bwp85_default(f9e49781-f94c-414e-a653-3b438954f981)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-bwp85" podUID="f9e49781-f94c-414e-a653-3b438954f981" May 10 02:17:45.744809 kubelet[1647]: I0510 02:17:45.744630 1647 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" May 10 02:17:45.745994 env[1294]: time="2025-05-10T02:17:45.745944466Z" level=info msg="StopPodSandbox for \"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305\"" May 10 02:17:45.794456 env[1294]: time="2025-05-10T02:17:45.794348276Z" level=error msg="StopPodSandbox for \"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305\" failed" error="failed to destroy network for sandbox \"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 02:17:45.795061 kubelet[1647]: E0510 02:17:45.794997 1647 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" May 10 02:17:45.795195 kubelet[1647]: E0510 02:17:45.795087 1647 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305"} May 10 02:17:45.795195 kubelet[1647]: E0510 02:17:45.795148 1647 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f9e49781-f94c-414e-a653-3b438954f981\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 02:17:45.795390 kubelet[1647]: E0510 02:17:45.795180 1647 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f9e49781-f94c-414e-a653-3b438954f981\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-bwp85" podUID="f9e49781-f94c-414e-a653-3b438954f981" May 10 02:17:46.433087 kubelet[1647]: E0510 02:17:46.433017 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:47.434202 kubelet[1647]: E0510 02:17:47.434130 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:48.435174 kubelet[1647]: E0510 02:17:48.435088 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:49.128853 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3481655738.mount: Deactivated successfully. May 10 02:17:49.252538 env[1294]: time="2025-05-10T02:17:49.252448423Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:49.255340 env[1294]: time="2025-05-10T02:17:49.255297907Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:49.257761 env[1294]: time="2025-05-10T02:17:49.257724531Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:49.259624 env[1294]: time="2025-05-10T02:17:49.259584531Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:49.260483 env[1294]: time="2025-05-10T02:17:49.260432333Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 10 02:17:49.281686 env[1294]: time="2025-05-10T02:17:49.281620170Z" level=info msg="CreateContainer within sandbox \"606cbdaabe4e15109c0e6d74553ee167fc3dd47f9057281f46a01d3378681dfe\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 02:17:49.301254 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount732574035.mount: Deactivated successfully. May 10 02:17:49.307234 env[1294]: time="2025-05-10T02:17:49.307190857Z" level=info msg="CreateContainer within sandbox \"606cbdaabe4e15109c0e6d74553ee167fc3dd47f9057281f46a01d3378681dfe\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"0b2f2cc46d75784b78e766508c04c7dad57f7e9f6bda68859164fa85980a42b0\"" May 10 02:17:49.308275 env[1294]: time="2025-05-10T02:17:49.308216438Z" level=info msg="StartContainer for \"0b2f2cc46d75784b78e766508c04c7dad57f7e9f6bda68859164fa85980a42b0\"" May 10 02:17:49.389627 env[1294]: time="2025-05-10T02:17:49.388322013Z" level=info msg="StartContainer for \"0b2f2cc46d75784b78e766508c04c7dad57f7e9f6bda68859164fa85980a42b0\" returns successfully" May 10 02:17:49.436196 kubelet[1647]: E0510 02:17:49.436074 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:49.510217 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 10 02:17:49.510392 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 10 02:17:50.436814 kubelet[1647]: E0510 02:17:50.436693 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:50.630485 env[1294]: time="2025-05-10T02:17:50.630386658Z" level=info msg="StopPodSandbox for \"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f\"" May 10 02:17:50.717901 kubelet[1647]: I0510 02:17:50.717304 1647 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-whdxq" podStartSLOduration=5.442174371 podStartE2EDuration="33.717247031s" podCreationTimestamp="2025-05-10 02:17:17 +0000 UTC" firstStartedPulling="2025-05-10 02:17:20.986764511 +0000 UTC m=+4.208428844" lastFinishedPulling="2025-05-10 02:17:49.261837164 +0000 UTC m=+32.483501504" observedRunningTime="2025-05-10 02:17:49.797891069 +0000 UTC m=+33.019555427" watchObservedRunningTime="2025-05-10 02:17:50.717247031 +0000 UTC m=+33.938911372" May 10 02:17:50.953566 env[1294]: 2025-05-10 02:17:50.717 [INFO][2428] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" May 10 02:17:50.953566 env[1294]: 2025-05-10 02:17:50.717 [INFO][2428] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" iface="eth0" netns="/var/run/netns/cni-4e8ec55b-f3d8-8a5d-c89b-6ac20f86126e" May 10 02:17:50.953566 env[1294]: 2025-05-10 02:17:50.717 [INFO][2428] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" iface="eth0" netns="/var/run/netns/cni-4e8ec55b-f3d8-8a5d-c89b-6ac20f86126e" May 10 02:17:50.953566 env[1294]: 2025-05-10 02:17:50.719 [INFO][2428] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" iface="eth0" netns="/var/run/netns/cni-4e8ec55b-f3d8-8a5d-c89b-6ac20f86126e" May 10 02:17:50.953566 env[1294]: 2025-05-10 02:17:50.719 [INFO][2428] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" May 10 02:17:50.953566 env[1294]: 2025-05-10 02:17:50.719 [INFO][2428] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" May 10 02:17:50.953566 env[1294]: 2025-05-10 02:17:50.931 [INFO][2435] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" HandleID="k8s-pod-network.5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" Workload="10.230.14.182-k8s-csi--node--driver--kgclv-eth0" May 10 02:17:50.953566 env[1294]: 2025-05-10 02:17:50.931 [INFO][2435] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 02:17:50.953566 env[1294]: 2025-05-10 02:17:50.932 [INFO][2435] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 02:17:50.953566 env[1294]: 2025-05-10 02:17:50.947 [WARNING][2435] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" HandleID="k8s-pod-network.5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" Workload="10.230.14.182-k8s-csi--node--driver--kgclv-eth0" May 10 02:17:50.953566 env[1294]: 2025-05-10 02:17:50.947 [INFO][2435] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" HandleID="k8s-pod-network.5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" Workload="10.230.14.182-k8s-csi--node--driver--kgclv-eth0" May 10 02:17:50.953566 env[1294]: 2025-05-10 02:17:50.950 [INFO][2435] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 02:17:50.953566 env[1294]: 2025-05-10 02:17:50.952 [INFO][2428] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" May 10 02:17:50.954841 env[1294]: time="2025-05-10T02:17:50.954786269Z" level=info msg="TearDown network for sandbox \"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f\" successfully" May 10 02:17:50.955006 env[1294]: time="2025-05-10T02:17:50.954960992Z" level=info msg="StopPodSandbox for \"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f\" returns successfully" May 10 02:17:50.956228 env[1294]: time="2025-05-10T02:17:50.956182030Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kgclv,Uid:02a841c1-207b-46a9-ad09-03738472e3b5,Namespace:calico-system,Attempt:1,}" May 10 02:17:50.958056 systemd[1]: run-netns-cni\x2d4e8ec55b\x2df3d8\x2d8a5d\x2dc89b\x2d6ac20f86126e.mount: Deactivated successfully. May 10 02:17:50.976823 kernel: kauditd_printk_skb: 14 callbacks suppressed May 10 02:17:50.977051 kernel: audit: type=1400 audit(1746843470.966:277): avc: denied { write } for pid=2504 comm="tee" name="fd" dev="proc" ino=21391 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 02:17:50.966000 audit[2504]: AVC avc: denied { write } for pid=2504 comm="tee" name="fd" dev="proc" ino=21391 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 02:17:50.966000 audit[2504]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2e5fba16 a2=241 a3=1b6 items=1 ppid=2469 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:50.997440 kernel: audit: type=1300 audit(1746843470.966:277): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2e5fba16 a2=241 a3=1b6 items=1 ppid=2469 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:50.966000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 02:17:51.010441 kernel: audit: type=1307 audit(1746843470.966:277): cwd="/etc/service/enabled/cni/log" May 10 02:17:50.966000 audit: PATH item=0 name="/dev/fd/63" inode=22334 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:17:51.019566 kernel: audit: type=1302 audit(1746843470.966:277): item=0 name="/dev/fd/63" inode=22334 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:17:50.966000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 02:17:51.033258 kernel: audit: type=1327 audit(1746843470.966:277): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 02:17:50.966000 audit[2506]: AVC avc: denied { write } for pid=2506 comm="tee" name="fd" dev="proc" ino=21393 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 02:17:51.047514 kernel: audit: type=1400 audit(1746843470.966:278): avc: denied { write } for pid=2506 comm="tee" name="fd" dev="proc" ino=21393 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 02:17:50.966000 audit[2506]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdcae01a14 a2=241 a3=1b6 items=1 ppid=2474 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.068501 kernel: audit: type=1300 audit(1746843470.966:278): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdcae01a14 a2=241 a3=1b6 items=1 ppid=2474 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:50.966000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 02:17:51.074558 kernel: audit: type=1307 audit(1746843470.966:278): cwd="/etc/service/enabled/felix/log" May 10 02:17:50.966000 audit: PATH item=0 name="/dev/fd/63" inode=21377 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:17:51.083503 kernel: audit: type=1302 audit(1746843470.966:278): item=0 name="/dev/fd/63" inode=21377 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:17:50.966000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 02:17:51.109529 kernel: audit: type=1327 audit(1746843470.966:278): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 02:17:50.988000 audit[2509]: AVC avc: denied { write } for pid=2509 comm="tee" name="fd" dev="proc" ino=21398 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 02:17:50.988000 audit[2509]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9a31ba14 a2=241 a3=1b6 items=1 ppid=2473 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:50.988000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 02:17:50.988000 audit: PATH item=0 name="/dev/fd/63" inode=21380 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:17:50.988000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 02:17:51.006000 audit[2513]: AVC avc: denied { write } for pid=2513 comm="tee" name="fd" dev="proc" ino=21402 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 02:17:51.006000 audit[2513]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd24e97a04 a2=241 a3=1b6 items=1 ppid=2467 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.006000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 02:17:51.006000 audit: PATH item=0 name="/dev/fd/63" inode=22345 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:17:51.006000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 02:17:51.035000 audit[2523]: AVC avc: denied { write } for pid=2523 comm="tee" name="fd" dev="proc" ino=21455 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 02:17:51.035000 audit[2523]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc48bca14 a2=241 a3=1b6 items=1 ppid=2472 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.035000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 02:17:51.035000 audit: PATH item=0 name="/dev/fd/63" inode=22353 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:17:51.035000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 02:17:51.057000 audit[2537]: AVC avc: denied { write } for pid=2537 comm="tee" name="fd" dev="proc" ino=22375 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 02:17:51.057000 audit[2537]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff91d71a05 a2=241 a3=1b6 items=1 ppid=2481 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.057000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 02:17:51.057000 audit: PATH item=0 name="/dev/fd/63" inode=22358 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:17:51.057000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 02:17:51.071000 audit[2528]: AVC avc: denied { write } for pid=2528 comm="tee" name="fd" dev="proc" ino=21466 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 02:17:51.071000 audit[2528]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeac2bba15 a2=241 a3=1b6 items=1 ppid=2486 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.071000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 02:17:51.071000 audit: PATH item=0 name="/dev/fd/63" inode=22356 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:17:51.071000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 02:17:51.406000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.406000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.406000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.406000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.406000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.406000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.406000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.406000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.406000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.406000 audit: BPF prog-id=10 op=LOAD May 10 02:17:51.406000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd31369b00 a2=98 a3=3 items=0 ppid=2489 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.406000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 02:17:51.408000 audit: BPF prog-id=10 op=UNLOAD May 10 02:17:51.408000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.408000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.408000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.408000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.408000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.408000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.408000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.408000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.408000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.408000 audit: BPF prog-id=11 op=LOAD May 10 02:17:51.408000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd313698e0 a2=74 a3=540051 items=0 ppid=2489 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.408000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 02:17:51.409000 audit: BPF prog-id=11 op=UNLOAD May 10 02:17:51.409000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.409000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.409000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.409000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.409000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.409000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.409000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.409000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.409000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.409000 audit: BPF prog-id=12 op=LOAD May 10 02:17:51.409000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd31369910 a2=94 a3=2 items=0 ppid=2489 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.409000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 02:17:51.409000 audit: BPF prog-id=12 op=UNLOAD May 10 02:17:51.437684 kubelet[1647]: E0510 02:17:51.437555 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:51.585136 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 02:17:51.585644 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9d675d099ec: link becomes ready May 10 02:17:51.585000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.585000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.585000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.585000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.585000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.585000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.585000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.585000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.585000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.585000 audit: BPF prog-id=13 op=LOAD May 10 02:17:51.585000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd313697d0 a2=40 a3=1 items=0 ppid=2489 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.585000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 02:17:51.585000 audit: BPF prog-id=13 op=UNLOAD May 10 02:17:51.585000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.585000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd313698a0 a2=50 a3=7ffd31369980 items=0 ppid=2489 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.585000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 02:17:51.586707 systemd-networkd[1075]: cali9d675d099ec: Link UP May 10 02:17:51.587340 systemd-networkd[1075]: cali9d675d099ec: Gained carrier May 10 02:17:51.600000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.600000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd313697e0 a2=28 a3=0 items=0 ppid=2489 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.600000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 02:17:51.600000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.600000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd31369810 a2=28 a3=0 items=0 ppid=2489 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.600000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 02:17:51.600000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.600000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd31369720 a2=28 a3=0 items=0 ppid=2489 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.600000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 02:17:51.600000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.600000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd31369830 a2=28 a3=0 items=0 ppid=2489 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.600000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 02:17:51.600000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.600000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd31369810 a2=28 a3=0 items=0 ppid=2489 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.600000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 02:17:51.600000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.600000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd31369800 a2=28 a3=0 items=0 ppid=2489 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.600000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 02:17:51.600000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.600000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd31369830 a2=28 a3=0 items=0 ppid=2489 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.600000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 02:17:51.600000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.600000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd31369810 a2=28 a3=0 items=0 ppid=2489 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.600000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 02:17:51.600000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.600000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd31369830 a2=28 a3=0 items=0 ppid=2489 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.600000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 02:17:51.600000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.600000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd31369800 a2=28 a3=0 items=0 ppid=2489 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.600000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 02:17:51.600000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.600000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd31369870 a2=28 a3=0 items=0 ppid=2489 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.600000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 02:17:51.600000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.600000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd31369620 a2=50 a3=1 items=0 ppid=2489 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.600000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 02:17:51.600000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.600000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.600000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.600000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.600000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.600000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.600000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.600000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.600000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.600000 audit: BPF prog-id=14 op=LOAD May 10 02:17:51.600000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd31369620 a2=94 a3=5 items=0 ppid=2489 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.600000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 02:17:51.600000 audit: BPF prog-id=14 op=UNLOAD May 10 02:17:51.601000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd313696d0 a2=50 a3=1 items=0 ppid=2489 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.601000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 02:17:51.601000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd313697f0 a2=4 a3=38 items=0 ppid=2489 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.601000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 02:17:51.601000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { confidentiality } for pid=2599 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:17:51.601000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd31369840 a2=94 a3=6 items=0 ppid=2489 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.601000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 02:17:51.601000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { confidentiality } for pid=2599 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:17:51.601000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd31368ff0 a2=94 a3=83 items=0 ppid=2489 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.601000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 02:17:51.601000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.601000 audit[2599]: AVC avc: denied { confidentiality } for pid=2599 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:17:51.601000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd31368ff0 a2=94 a3=83 items=0 ppid=2489 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.601000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 02:17:51.617000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit: BPF prog-id=15 op=LOAD May 10 02:17:51.617000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff582dec00 a2=98 a3=1999999999999999 items=0 ppid=2489 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.617000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 02:17:51.617000 audit: BPF prog-id=15 op=UNLOAD May 10 02:17:51.617000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit: BPF prog-id=16 op=LOAD May 10 02:17:51.617000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff582deae0 a2=74 a3=ffff items=0 ppid=2489 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.617000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 02:17:51.617000 audit: BPF prog-id=16 op=UNLOAD May 10 02:17:51.617000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.617000 audit: BPF prog-id=17 op=LOAD May 10 02:17:51.617000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff582deb20 a2=40 a3=7fff582ded00 items=0 ppid=2489 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.617000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 02:17:51.617000 audit: BPF prog-id=17 op=UNLOAD May 10 02:17:51.627022 env[1294]: 2025-05-10 02:17:51.191 [INFO][2544] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 10 02:17:51.627022 env[1294]: 2025-05-10 02:17:51.246 [INFO][2544] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.230.14.182-k8s-csi--node--driver--kgclv-eth0 csi-node-driver- calico-system 02a841c1-207b-46a9-ad09-03738472e3b5 1353 0 2025-05-10 02:17:17 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.230.14.182 csi-node-driver-kgclv eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali9d675d099ec [] []}} ContainerID="5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e" Namespace="calico-system" Pod="csi-node-driver-kgclv" WorkloadEndpoint="10.230.14.182-k8s-csi--node--driver--kgclv-" May 10 02:17:51.627022 env[1294]: 2025-05-10 02:17:51.246 [INFO][2544] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e" Namespace="calico-system" Pod="csi-node-driver-kgclv" WorkloadEndpoint="10.230.14.182-k8s-csi--node--driver--kgclv-eth0" May 10 02:17:51.627022 env[1294]: 2025-05-10 02:17:51.363 [INFO][2565] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e" HandleID="k8s-pod-network.5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e" Workload="10.230.14.182-k8s-csi--node--driver--kgclv-eth0" May 10 02:17:51.627022 env[1294]: 2025-05-10 02:17:51.390 [INFO][2565] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e" HandleID="k8s-pod-network.5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e" Workload="10.230.14.182-k8s-csi--node--driver--kgclv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000381700), Attrs:map[string]string{"namespace":"calico-system", "node":"10.230.14.182", "pod":"csi-node-driver-kgclv", "timestamp":"2025-05-10 02:17:51.363510531 +0000 UTC"}, Hostname:"10.230.14.182", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 02:17:51.627022 env[1294]: 2025-05-10 02:17:51.390 [INFO][2565] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 02:17:51.627022 env[1294]: 2025-05-10 02:17:51.391 [INFO][2565] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 02:17:51.627022 env[1294]: 2025-05-10 02:17:51.391 [INFO][2565] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.230.14.182' May 10 02:17:51.627022 env[1294]: 2025-05-10 02:17:51.397 [INFO][2565] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e" host="10.230.14.182" May 10 02:17:51.627022 env[1294]: 2025-05-10 02:17:51.407 [INFO][2565] ipam/ipam.go 372: Looking up existing affinities for host host="10.230.14.182" May 10 02:17:51.627022 env[1294]: 2025-05-10 02:17:51.413 [INFO][2565] ipam/ipam.go 489: Trying affinity for 192.168.97.128/26 host="10.230.14.182" May 10 02:17:51.627022 env[1294]: 2025-05-10 02:17:51.421 [INFO][2565] ipam/ipam.go 155: Attempting to load block cidr=192.168.97.128/26 host="10.230.14.182" May 10 02:17:51.627022 env[1294]: 2025-05-10 02:17:51.434 [INFO][2565] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.97.128/26 host="10.230.14.182" May 10 02:17:51.627022 env[1294]: 2025-05-10 02:17:51.435 [INFO][2565] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.97.128/26 handle="k8s-pod-network.5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e" host="10.230.14.182" May 10 02:17:51.627022 env[1294]: 2025-05-10 02:17:51.438 [INFO][2565] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e May 10 02:17:51.627022 env[1294]: 2025-05-10 02:17:51.444 [INFO][2565] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.97.128/26 handle="k8s-pod-network.5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e" host="10.230.14.182" May 10 02:17:51.627022 env[1294]: 2025-05-10 02:17:51.460 [INFO][2565] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.97.129/26] block=192.168.97.128/26 handle="k8s-pod-network.5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e" host="10.230.14.182" May 10 02:17:51.627022 env[1294]: 2025-05-10 02:17:51.460 [INFO][2565] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.97.129/26] handle="k8s-pod-network.5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e" host="10.230.14.182" May 10 02:17:51.627022 env[1294]: 2025-05-10 02:17:51.460 [INFO][2565] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 02:17:51.627022 env[1294]: 2025-05-10 02:17:51.460 [INFO][2565] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.97.129/26] IPv6=[] ContainerID="5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e" HandleID="k8s-pod-network.5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e" Workload="10.230.14.182-k8s-csi--node--driver--kgclv-eth0" May 10 02:17:51.628515 env[1294]: 2025-05-10 02:17:51.463 [INFO][2544] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e" Namespace="calico-system" Pod="csi-node-driver-kgclv" WorkloadEndpoint="10.230.14.182-k8s-csi--node--driver--kgclv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.230.14.182-k8s-csi--node--driver--kgclv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"02a841c1-207b-46a9-ad09-03738472e3b5", ResourceVersion:"1353", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 2, 17, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.230.14.182", ContainerID:"", Pod:"csi-node-driver-kgclv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.97.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9d675d099ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 02:17:51.628515 env[1294]: 2025-05-10 02:17:51.463 [INFO][2544] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.97.129/32] ContainerID="5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e" Namespace="calico-system" Pod="csi-node-driver-kgclv" WorkloadEndpoint="10.230.14.182-k8s-csi--node--driver--kgclv-eth0" May 10 02:17:51.628515 env[1294]: 2025-05-10 02:17:51.463 [INFO][2544] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9d675d099ec ContainerID="5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e" Namespace="calico-system" Pod="csi-node-driver-kgclv" WorkloadEndpoint="10.230.14.182-k8s-csi--node--driver--kgclv-eth0" May 10 02:17:51.628515 env[1294]: 2025-05-10 02:17:51.593 [INFO][2544] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e" Namespace="calico-system" Pod="csi-node-driver-kgclv" WorkloadEndpoint="10.230.14.182-k8s-csi--node--driver--kgclv-eth0" May 10 02:17:51.628515 env[1294]: 2025-05-10 02:17:51.596 [INFO][2544] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e" Namespace="calico-system" Pod="csi-node-driver-kgclv" WorkloadEndpoint="10.230.14.182-k8s-csi--node--driver--kgclv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.230.14.182-k8s-csi--node--driver--kgclv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"02a841c1-207b-46a9-ad09-03738472e3b5", ResourceVersion:"1353", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 2, 17, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.230.14.182", ContainerID:"5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e", Pod:"csi-node-driver-kgclv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.97.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9d675d099ec", MAC:"4a:c4:1e:1e:54:29", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 02:17:51.628515 env[1294]: 2025-05-10 02:17:51.609 [INFO][2544] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e" Namespace="calico-system" Pod="csi-node-driver-kgclv" WorkloadEndpoint="10.230.14.182-k8s-csi--node--driver--kgclv-eth0" May 10 02:17:51.688228 env[1294]: time="2025-05-10T02:17:51.686025046Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 02:17:51.688228 env[1294]: time="2025-05-10T02:17:51.686099213Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 02:17:51.688228 env[1294]: time="2025-05-10T02:17:51.686116211Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 02:17:51.699321 env[1294]: time="2025-05-10T02:17:51.689126848Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e pid=2634 runtime=io.containerd.runc.v2 May 10 02:17:51.765646 systemd-networkd[1075]: vxlan.calico: Link UP May 10 02:17:51.765658 systemd-networkd[1075]: vxlan.calico: Gained carrier May 10 02:17:51.789000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit: BPF prog-id=18 op=LOAD May 10 02:17:51.789000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffed44b6ae0 a2=98 a3=ffff items=0 ppid=2489 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.789000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 02:17:51.789000 audit: BPF prog-id=18 op=UNLOAD May 10 02:17:51.789000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit: BPF prog-id=19 op=LOAD May 10 02:17:51.789000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffed44b68f0 a2=74 a3=540051 items=0 ppid=2489 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.789000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 02:17:51.789000 audit: BPF prog-id=19 op=UNLOAD May 10 02:17:51.789000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit: BPF prog-id=20 op=LOAD May 10 02:17:51.789000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffed44b6920 a2=94 a3=2 items=0 ppid=2489 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.789000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 02:17:51.789000 audit: BPF prog-id=20 op=UNLOAD May 10 02:17:51.789000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffed44b67f0 a2=28 a3=0 items=0 ppid=2489 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.789000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffed44b6820 a2=28 a3=0 items=0 ppid=2489 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.789000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 02:17:51.789000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.789000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffed44b6730 a2=28 a3=0 items=0 ppid=2489 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.789000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 02:17:51.790000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.790000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffed44b6840 a2=28 a3=0 items=0 ppid=2489 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.790000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 02:17:51.790000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.790000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffed44b6820 a2=28 a3=0 items=0 ppid=2489 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.790000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 02:17:51.790000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.790000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffed44b6810 a2=28 a3=0 items=0 ppid=2489 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.790000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 02:17:51.790000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.790000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffed44b6840 a2=28 a3=0 items=0 ppid=2489 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.790000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 02:17:51.790000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.790000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffed44b6820 a2=28 a3=0 items=0 ppid=2489 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.790000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 02:17:51.790000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.790000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffed44b6840 a2=28 a3=0 items=0 ppid=2489 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.790000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 02:17:51.790000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.790000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffed44b6810 a2=28 a3=0 items=0 ppid=2489 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.790000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 02:17:51.790000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.790000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffed44b6880 a2=28 a3=0 items=0 ppid=2489 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.790000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 02:17:51.790000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.790000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.790000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.790000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.790000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.790000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.790000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.790000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.790000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.790000 audit: BPF prog-id=21 op=LOAD May 10 02:17:51.790000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffed44b66f0 a2=40 a3=0 items=0 ppid=2489 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.790000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 02:17:51.790000 audit: BPF prog-id=21 op=UNLOAD May 10 02:17:51.790000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.790000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffed44b66e0 a2=50 a3=2800 items=0 ppid=2489 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.790000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 02:17:51.791000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.791000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffed44b66e0 a2=50 a3=2800 items=0 ppid=2489 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.791000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 02:17:51.791000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.791000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.791000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.791000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.791000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.791000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.791000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.791000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.791000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.791000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.791000 audit: BPF prog-id=22 op=LOAD May 10 02:17:51.791000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffed44b5f00 a2=94 a3=2 items=0 ppid=2489 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.791000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 02:17:51.791000 audit: BPF prog-id=22 op=UNLOAD May 10 02:17:51.791000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.791000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.791000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.791000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.791000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.791000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.791000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.791000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.791000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.791000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.791000 audit: BPF prog-id=23 op=LOAD May 10 02:17:51.791000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffed44b6000 a2=94 a3=30 items=0 ppid=2489 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.791000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 02:17:51.795000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.795000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.795000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.795000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.795000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.795000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.795000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.795000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.795000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.795000 audit: BPF prog-id=24 op=LOAD May 10 02:17:51.795000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdeaa05c30 a2=98 a3=0 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.795000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:51.795000 audit: BPF prog-id=24 op=UNLOAD May 10 02:17:51.795000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.795000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.795000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.795000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.795000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.795000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.795000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.795000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.795000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.795000 audit: BPF prog-id=25 op=LOAD May 10 02:17:51.795000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdeaa05a10 a2=74 a3=540051 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.795000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:51.796000 audit: BPF prog-id=25 op=UNLOAD May 10 02:17:51.796000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.796000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.796000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.796000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.796000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.796000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.796000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.796000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.796000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.796000 audit: BPF prog-id=26 op=LOAD May 10 02:17:51.796000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdeaa05a40 a2=94 a3=2 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.796000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:51.796000 audit: BPF prog-id=26 op=UNLOAD May 10 02:17:51.870897 env[1294]: time="2025-05-10T02:17:51.870834941Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kgclv,Uid:02a841c1-207b-46a9-ad09-03738472e3b5,Namespace:calico-system,Attempt:1,} returns sandbox id \"5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e\"" May 10 02:17:51.878947 env[1294]: time="2025-05-10T02:17:51.878666598Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 10 02:17:51.936959 systemd[1]: run-containerd-runc-k8s.io-0b2f2cc46d75784b78e766508c04c7dad57f7e9f6bda68859164fa85980a42b0-runc.Cus4xS.mount: Deactivated successfully. May 10 02:17:51.981000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.981000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.981000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.981000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.981000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.981000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.981000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.981000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.981000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.981000 audit: BPF prog-id=27 op=LOAD May 10 02:17:51.981000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdeaa05900 a2=40 a3=1 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.981000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:51.981000 audit: BPF prog-id=27 op=UNLOAD May 10 02:17:51.981000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:51.981000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdeaa059d0 a2=50 a3=7ffdeaa05ab0 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:51.981000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:52.000000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.000000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdeaa05910 a2=28 a3=0 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.000000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:52.000000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.000000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdeaa05940 a2=28 a3=0 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.000000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:52.001000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.001000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdeaa05850 a2=28 a3=0 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.001000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:52.001000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.001000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdeaa05960 a2=28 a3=0 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.001000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:52.001000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.001000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdeaa05940 a2=28 a3=0 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.001000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:52.002000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.002000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdeaa05930 a2=28 a3=0 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:52.002000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.002000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdeaa05960 a2=28 a3=0 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:52.002000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.002000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdeaa05940 a2=28 a3=0 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:52.002000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.002000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdeaa05960 a2=28 a3=0 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:52.002000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.002000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdeaa05930 a2=28 a3=0 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:52.002000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.002000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdeaa059a0 a2=28 a3=0 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:52.002000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.002000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdeaa05750 a2=50 a3=1 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:52.002000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.002000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.002000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.002000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.002000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.002000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.002000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.002000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.002000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.002000 audit: BPF prog-id=28 op=LOAD May 10 02:17:52.002000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdeaa05750 a2=94 a3=5 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:52.004000 audit: BPF prog-id=28 op=UNLOAD May 10 02:17:52.004000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.004000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdeaa05800 a2=50 a3=1 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.004000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:52.004000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.004000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdeaa05920 a2=4 a3=38 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.004000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:52.004000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.004000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.004000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.004000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.004000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.004000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.004000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.004000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.004000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.004000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.004000 audit[2676]: AVC avc: denied { confidentiality } for pid=2676 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:17:52.004000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdeaa05970 a2=94 a3=6 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.004000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:52.007000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.007000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.007000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.007000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.007000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.007000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.007000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.007000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.007000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.007000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.007000 audit[2676]: AVC avc: denied { confidentiality } for pid=2676 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:17:52.007000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdeaa05120 a2=94 a3=83 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.007000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:52.007000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.007000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.007000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.007000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.007000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.007000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.007000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.007000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.007000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.007000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.007000 audit[2676]: AVC avc: denied { confidentiality } for pid=2676 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:17:52.007000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdeaa05120 a2=94 a3=83 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.007000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:52.008000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.008000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdeaa06b60 a2=10 a3=f1f00800 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.008000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:52.008000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.008000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdeaa06a00 a2=10 a3=3 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.008000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:52.008000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.008000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdeaa069a0 a2=10 a3=3 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.008000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:52.008000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 02:17:52.008000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdeaa069a0 a2=10 a3=7 items=0 ppid=2489 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.008000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 02:17:52.016000 audit: BPF prog-id=23 op=UNLOAD May 10 02:17:52.114000 audit[2745]: NETFILTER_CFG table=mangle:81 family=2 entries=16 op=nft_register_chain pid=2745 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 02:17:52.114000 audit[2745]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffda864f650 a2=0 a3=7ffda864f63c items=0 ppid=2489 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.114000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 02:17:52.121000 audit[2738]: NETFILTER_CFG table=nat:82 family=2 entries=15 op=nft_register_chain pid=2738 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 02:17:52.121000 audit[2738]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff9035cab0 a2=0 a3=7fff9035ca9c items=0 ppid=2489 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.121000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 02:17:52.124000 audit[2739]: NETFILTER_CFG table=filter:83 family=2 entries=69 op=nft_register_chain pid=2739 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 02:17:52.124000 audit[2739]: SYSCALL arch=c000003e syscall=46 success=yes exit=36404 a0=3 a1=7ffd6d63edb0 a2=0 a3=7ffd6d63ed9c items=0 ppid=2489 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.124000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 02:17:52.129000 audit[2737]: NETFILTER_CFG table=raw:84 family=2 entries=21 op=nft_register_chain pid=2737 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 02:17:52.129000 audit[2737]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc9ec880c0 a2=0 a3=7ffc9ec880ac items=0 ppid=2489 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:17:52.129000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 02:17:52.438544 kubelet[1647]: E0510 02:17:52.438482 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:52.773753 systemd-networkd[1075]: cali9d675d099ec: Gained IPv6LL May 10 02:17:52.835782 systemd-networkd[1075]: vxlan.calico: Gained IPv6LL May 10 02:17:53.425552 env[1294]: time="2025-05-10T02:17:53.425478560Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:53.428243 env[1294]: time="2025-05-10T02:17:53.428206722Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:53.431014 env[1294]: time="2025-05-10T02:17:53.430964388Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:53.433596 env[1294]: time="2025-05-10T02:17:53.433535542Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:53.434550 env[1294]: time="2025-05-10T02:17:53.434489636Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 10 02:17:53.438863 kubelet[1647]: E0510 02:17:53.438825 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:53.439765 env[1294]: time="2025-05-10T02:17:53.439712704Z" level=info msg="CreateContainer within sandbox \"5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 10 02:17:53.456939 env[1294]: time="2025-05-10T02:17:53.456896338Z" level=info msg="CreateContainer within sandbox \"5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"1fc8e3231c8ed5a1bcb4aba4633eaea5370d278d933ee550158a6f0ac688ce97\"" May 10 02:17:53.458197 env[1294]: time="2025-05-10T02:17:53.458155350Z" level=info msg="StartContainer for \"1fc8e3231c8ed5a1bcb4aba4633eaea5370d278d933ee550158a6f0ac688ce97\"" May 10 02:17:53.499679 systemd[1]: run-containerd-runc-k8s.io-1fc8e3231c8ed5a1bcb4aba4633eaea5370d278d933ee550158a6f0ac688ce97-runc.NUHK2v.mount: Deactivated successfully. May 10 02:17:53.561954 env[1294]: time="2025-05-10T02:17:53.561836057Z" level=info msg="StartContainer for \"1fc8e3231c8ed5a1bcb4aba4633eaea5370d278d933ee550158a6f0ac688ce97\" returns successfully" May 10 02:17:53.565663 env[1294]: time="2025-05-10T02:17:53.565622380Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 10 02:17:54.440179 kubelet[1647]: E0510 02:17:54.440106 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:55.422831 env[1294]: time="2025-05-10T02:17:55.422718524Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:55.424673 env[1294]: time="2025-05-10T02:17:55.424634131Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:55.426585 env[1294]: time="2025-05-10T02:17:55.426550456Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:55.428000 env[1294]: time="2025-05-10T02:17:55.427965018Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:17:55.428939 env[1294]: time="2025-05-10T02:17:55.428896076Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 10 02:17:55.432954 env[1294]: time="2025-05-10T02:17:55.432915270Z" level=info msg="CreateContainer within sandbox \"5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 10 02:17:55.440575 kubelet[1647]: E0510 02:17:55.440494 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:55.453245 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1227373286.mount: Deactivated successfully. May 10 02:17:55.457083 env[1294]: time="2025-05-10T02:17:55.457027966Z" level=info msg="CreateContainer within sandbox \"5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"1fdefbc733eccf908bd4ed02142e6977bee35a97928bab82d5ca9e99d5ad2fcb\"" May 10 02:17:55.457985 env[1294]: time="2025-05-10T02:17:55.457951219Z" level=info msg="StartContainer for \"1fdefbc733eccf908bd4ed02142e6977bee35a97928bab82d5ca9e99d5ad2fcb\"" May 10 02:17:55.577548 env[1294]: time="2025-05-10T02:17:55.575602671Z" level=info msg="StartContainer for \"1fdefbc733eccf908bd4ed02142e6977bee35a97928bab82d5ca9e99d5ad2fcb\" returns successfully" May 10 02:17:55.589572 kubelet[1647]: I0510 02:17:55.589477 1647 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 10 02:17:55.589572 kubelet[1647]: I0510 02:17:55.589581 1647 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 10 02:17:56.441049 kubelet[1647]: E0510 02:17:56.440990 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:56.447390 systemd[1]: run-containerd-runc-k8s.io-1fdefbc733eccf908bd4ed02142e6977bee35a97928bab82d5ca9e99d5ad2fcb-runc.qJqN0a.mount: Deactivated successfully. May 10 02:17:57.401838 kubelet[1647]: E0510 02:17:57.401774 1647 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:57.442320 kubelet[1647]: E0510 02:17:57.442274 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:58.443258 kubelet[1647]: E0510 02:17:58.443195 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:17:59.444656 kubelet[1647]: E0510 02:17:59.444559 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:00.445027 kubelet[1647]: E0510 02:18:00.444964 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:00.630565 env[1294]: time="2025-05-10T02:18:00.630021799Z" level=info msg="StopPodSandbox for \"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305\"" May 10 02:18:00.743823 kubelet[1647]: I0510 02:18:00.743214 1647 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-kgclv" podStartSLOduration=40.190776813 podStartE2EDuration="43.743189943s" podCreationTimestamp="2025-05-10 02:17:17 +0000 UTC" firstStartedPulling="2025-05-10 02:17:51.877899585 +0000 UTC m=+35.099563918" lastFinishedPulling="2025-05-10 02:17:55.430312715 +0000 UTC m=+38.651977048" observedRunningTime="2025-05-10 02:17:55.812001901 +0000 UTC m=+39.033666254" watchObservedRunningTime="2025-05-10 02:18:00.743189943 +0000 UTC m=+43.964854283" May 10 02:18:00.817355 env[1294]: 2025-05-10 02:18:00.742 [INFO][2846] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" May 10 02:18:00.817355 env[1294]: 2025-05-10 02:18:00.742 [INFO][2846] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" iface="eth0" netns="/var/run/netns/cni-7dbf9803-a7ca-6e0b-23b1-e18ea7baa9a6" May 10 02:18:00.817355 env[1294]: 2025-05-10 02:18:00.743 [INFO][2846] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" iface="eth0" netns="/var/run/netns/cni-7dbf9803-a7ca-6e0b-23b1-e18ea7baa9a6" May 10 02:18:00.817355 env[1294]: 2025-05-10 02:18:00.744 [INFO][2846] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" iface="eth0" netns="/var/run/netns/cni-7dbf9803-a7ca-6e0b-23b1-e18ea7baa9a6" May 10 02:18:00.817355 env[1294]: 2025-05-10 02:18:00.744 [INFO][2846] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" May 10 02:18:00.817355 env[1294]: 2025-05-10 02:18:00.744 [INFO][2846] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" May 10 02:18:00.817355 env[1294]: 2025-05-10 02:18:00.777 [INFO][2854] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" HandleID="k8s-pod-network.2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" Workload="10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0" May 10 02:18:00.817355 env[1294]: 2025-05-10 02:18:00.777 [INFO][2854] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 02:18:00.817355 env[1294]: 2025-05-10 02:18:00.777 [INFO][2854] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 02:18:00.817355 env[1294]: 2025-05-10 02:18:00.801 [WARNING][2854] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" HandleID="k8s-pod-network.2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" Workload="10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0" May 10 02:18:00.817355 env[1294]: 2025-05-10 02:18:00.801 [INFO][2854] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" HandleID="k8s-pod-network.2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" Workload="10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0" May 10 02:18:00.817355 env[1294]: 2025-05-10 02:18:00.814 [INFO][2854] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 02:18:00.817355 env[1294]: 2025-05-10 02:18:00.815 [INFO][2846] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" May 10 02:18:00.821800 systemd[1]: run-netns-cni\x2d7dbf9803\x2da7ca\x2d6e0b\x2d23b1\x2de18ea7baa9a6.mount: Deactivated successfully. May 10 02:18:00.823395 env[1294]: time="2025-05-10T02:18:00.822896108Z" level=info msg="TearDown network for sandbox \"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305\" successfully" May 10 02:18:00.823395 env[1294]: time="2025-05-10T02:18:00.822946967Z" level=info msg="StopPodSandbox for \"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305\" returns successfully" May 10 02:18:00.823865 env[1294]: time="2025-05-10T02:18:00.823828246Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-bwp85,Uid:f9e49781-f94c-414e-a653-3b438954f981,Namespace:default,Attempt:1,}" May 10 02:18:01.011708 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 02:18:01.012030 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliea821e56abd: link becomes ready May 10 02:18:01.016844 systemd-networkd[1075]: caliea821e56abd: Link UP May 10 02:18:01.019066 systemd-networkd[1075]: caliea821e56abd: Gained carrier May 10 02:18:01.047525 env[1294]: 2025-05-10 02:18:00.889 [INFO][2860] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0 nginx-deployment-85f456d6dd- default f9e49781-f94c-414e-a653-3b438954f981 1399 0 2025-05-10 02:17:44 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.230.14.182 nginx-deployment-85f456d6dd-bwp85 eth0 default [] [] [kns.default ksa.default.default] caliea821e56abd [] []}} ContainerID="5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec" Namespace="default" Pod="nginx-deployment-85f456d6dd-bwp85" WorkloadEndpoint="10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-" May 10 02:18:01.047525 env[1294]: 2025-05-10 02:18:00.890 [INFO][2860] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec" Namespace="default" Pod="nginx-deployment-85f456d6dd-bwp85" WorkloadEndpoint="10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0" May 10 02:18:01.047525 env[1294]: 2025-05-10 02:18:00.933 [INFO][2874] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec" HandleID="k8s-pod-network.5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec" Workload="10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0" May 10 02:18:01.047525 env[1294]: 2025-05-10 02:18:00.954 [INFO][2874] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec" HandleID="k8s-pod-network.5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec" Workload="10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002653d0), Attrs:map[string]string{"namespace":"default", "node":"10.230.14.182", "pod":"nginx-deployment-85f456d6dd-bwp85", "timestamp":"2025-05-10 02:18:00.933759792 +0000 UTC"}, Hostname:"10.230.14.182", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 02:18:01.047525 env[1294]: 2025-05-10 02:18:00.954 [INFO][2874] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 02:18:01.047525 env[1294]: 2025-05-10 02:18:00.954 [INFO][2874] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 02:18:01.047525 env[1294]: 2025-05-10 02:18:00.954 [INFO][2874] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.230.14.182' May 10 02:18:01.047525 env[1294]: 2025-05-10 02:18:00.959 [INFO][2874] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec" host="10.230.14.182" May 10 02:18:01.047525 env[1294]: 2025-05-10 02:18:00.967 [INFO][2874] ipam/ipam.go 372: Looking up existing affinities for host host="10.230.14.182" May 10 02:18:01.047525 env[1294]: 2025-05-10 02:18:00.975 [INFO][2874] ipam/ipam.go 489: Trying affinity for 192.168.97.128/26 host="10.230.14.182" May 10 02:18:01.047525 env[1294]: 2025-05-10 02:18:00.978 [INFO][2874] ipam/ipam.go 155: Attempting to load block cidr=192.168.97.128/26 host="10.230.14.182" May 10 02:18:01.047525 env[1294]: 2025-05-10 02:18:00.981 [INFO][2874] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.97.128/26 host="10.230.14.182" May 10 02:18:01.047525 env[1294]: 2025-05-10 02:18:00.981 [INFO][2874] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.97.128/26 handle="k8s-pod-network.5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec" host="10.230.14.182" May 10 02:18:01.047525 env[1294]: 2025-05-10 02:18:00.984 [INFO][2874] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec May 10 02:18:01.047525 env[1294]: 2025-05-10 02:18:00.990 [INFO][2874] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.97.128/26 handle="k8s-pod-network.5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec" host="10.230.14.182" May 10 02:18:01.047525 env[1294]: 2025-05-10 02:18:00.999 [INFO][2874] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.97.130/26] block=192.168.97.128/26 handle="k8s-pod-network.5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec" host="10.230.14.182" May 10 02:18:01.047525 env[1294]: 2025-05-10 02:18:00.999 [INFO][2874] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.97.130/26] handle="k8s-pod-network.5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec" host="10.230.14.182" May 10 02:18:01.047525 env[1294]: 2025-05-10 02:18:00.999 [INFO][2874] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 02:18:01.047525 env[1294]: 2025-05-10 02:18:00.999 [INFO][2874] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.97.130/26] IPv6=[] ContainerID="5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec" HandleID="k8s-pod-network.5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec" Workload="10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0" May 10 02:18:01.070240 kernel: kauditd_printk_skb: 505 callbacks suppressed May 10 02:18:01.070420 kernel: audit: type=1325 audit(1746843481.053:379): table=filter:85 family=2 entries=38 op=nft_register_chain pid=2886 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 02:18:01.070555 kernel: audit: type=1300 audit(1746843481.053:379): arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffcf2165110 a2=0 a3=7ffcf21650fc items=0 ppid=2489 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:01.070708 kernel: audit: type=1327 audit(1746843481.053:379): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 02:18:01.053000 audit[2886]: NETFILTER_CFG table=filter:85 family=2 entries=38 op=nft_register_chain pid=2886 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 02:18:01.053000 audit[2886]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffcf2165110 a2=0 a3=7ffcf21650fc items=0 ppid=2489 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:01.053000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 02:18:01.071461 env[1294]: 2025-05-10 02:18:01.002 [INFO][2860] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec" Namespace="default" Pod="nginx-deployment-85f456d6dd-bwp85" WorkloadEndpoint="10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"f9e49781-f94c-414e-a653-3b438954f981", ResourceVersion:"1399", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 2, 17, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.230.14.182", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-bwp85", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliea821e56abd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 02:18:01.071461 env[1294]: 2025-05-10 02:18:01.002 [INFO][2860] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.97.130/32] ContainerID="5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec" Namespace="default" Pod="nginx-deployment-85f456d6dd-bwp85" WorkloadEndpoint="10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0" May 10 02:18:01.071461 env[1294]: 2025-05-10 02:18:01.002 [INFO][2860] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliea821e56abd ContainerID="5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec" Namespace="default" Pod="nginx-deployment-85f456d6dd-bwp85" WorkloadEndpoint="10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0" May 10 02:18:01.071461 env[1294]: 2025-05-10 02:18:01.023 [INFO][2860] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec" Namespace="default" Pod="nginx-deployment-85f456d6dd-bwp85" WorkloadEndpoint="10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0" May 10 02:18:01.071461 env[1294]: 2025-05-10 02:18:01.024 [INFO][2860] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec" Namespace="default" Pod="nginx-deployment-85f456d6dd-bwp85" WorkloadEndpoint="10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"f9e49781-f94c-414e-a653-3b438954f981", ResourceVersion:"1399", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 2, 17, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.230.14.182", ContainerID:"5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec", Pod:"nginx-deployment-85f456d6dd-bwp85", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliea821e56abd", MAC:"fa:89:bc:91:86:b6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 02:18:01.071461 env[1294]: 2025-05-10 02:18:01.044 [INFO][2860] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec" Namespace="default" Pod="nginx-deployment-85f456d6dd-bwp85" WorkloadEndpoint="10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0" May 10 02:18:01.071461 env[1294]: time="2025-05-10T02:18:01.068953986Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 02:18:01.071461 env[1294]: time="2025-05-10T02:18:01.069247019Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 02:18:01.071461 env[1294]: time="2025-05-10T02:18:01.069293592Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 02:18:01.071461 env[1294]: time="2025-05-10T02:18:01.069721904Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec pid=2904 runtime=io.containerd.runc.v2 May 10 02:18:01.170304 env[1294]: time="2025-05-10T02:18:01.170121532Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-bwp85,Uid:f9e49781-f94c-414e-a653-3b438954f981,Namespace:default,Attempt:1,} returns sandbox id \"5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec\"" May 10 02:18:01.173812 env[1294]: time="2025-05-10T02:18:01.173765453Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 10 02:18:01.446339 kubelet[1647]: E0510 02:18:01.446247 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:02.447083 kubelet[1647]: E0510 02:18:02.446969 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:02.692693 systemd-networkd[1075]: caliea821e56abd: Gained IPv6LL May 10 02:18:03.448495 kubelet[1647]: E0510 02:18:03.448354 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:04.449551 kubelet[1647]: E0510 02:18:04.449482 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:05.450056 kubelet[1647]: E0510 02:18:05.449980 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:06.046088 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4176197074.mount: Deactivated successfully. May 10 02:18:06.450777 kubelet[1647]: E0510 02:18:06.450712 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:07.452701 kubelet[1647]: E0510 02:18:07.452616 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:08.453371 kubelet[1647]: E0510 02:18:08.453309 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:08.557354 env[1294]: time="2025-05-10T02:18:08.557277675Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:18:08.561361 env[1294]: time="2025-05-10T02:18:08.561325957Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:18:08.564689 env[1294]: time="2025-05-10T02:18:08.564653107Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:18:08.566951 env[1294]: time="2025-05-10T02:18:08.566916525Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:18:08.568221 env[1294]: time="2025-05-10T02:18:08.568168884Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 10 02:18:08.573460 env[1294]: time="2025-05-10T02:18:08.573393598Z" level=info msg="CreateContainer within sandbox \"5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 10 02:18:08.595599 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1104554429.mount: Deactivated successfully. May 10 02:18:08.600206 env[1294]: time="2025-05-10T02:18:08.600042053Z" level=info msg="CreateContainer within sandbox \"5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"dcbb8d6de20f971d27a8cf0be720e81ad20a0f5df31f723da562d0a82aca5246\"" May 10 02:18:08.601515 env[1294]: time="2025-05-10T02:18:08.601476900Z" level=info msg="StartContainer for \"dcbb8d6de20f971d27a8cf0be720e81ad20a0f5df31f723da562d0a82aca5246\"" May 10 02:18:08.751997 env[1294]: time="2025-05-10T02:18:08.751285676Z" level=info msg="StartContainer for \"dcbb8d6de20f971d27a8cf0be720e81ad20a0f5df31f723da562d0a82aca5246\" returns successfully" May 10 02:18:08.846908 kubelet[1647]: I0510 02:18:08.846771 1647 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-bwp85" podStartSLOduration=17.448671219 podStartE2EDuration="24.846717846s" podCreationTimestamp="2025-05-10 02:17:44 +0000 UTC" firstStartedPulling="2025-05-10 02:18:01.172743321 +0000 UTC m=+44.394407655" lastFinishedPulling="2025-05-10 02:18:08.570789942 +0000 UTC m=+51.792454282" observedRunningTime="2025-05-10 02:18:08.845678859 +0000 UTC m=+52.067343201" watchObservedRunningTime="2025-05-10 02:18:08.846717846 +0000 UTC m=+52.068382198" May 10 02:18:09.454241 kubelet[1647]: E0510 02:18:09.454169 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:10.454387 kubelet[1647]: E0510 02:18:10.454329 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:11.455648 kubelet[1647]: E0510 02:18:11.455574 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:12.456729 kubelet[1647]: E0510 02:18:12.456652 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:13.457753 kubelet[1647]: E0510 02:18:13.457648 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:14.458509 kubelet[1647]: E0510 02:18:14.458399 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:15.460037 kubelet[1647]: E0510 02:18:15.459952 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:16.461908 kubelet[1647]: E0510 02:18:16.461827 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:17.401896 kubelet[1647]: E0510 02:18:17.401814 1647 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:17.462370 kubelet[1647]: E0510 02:18:17.462269 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:17.516879 env[1294]: time="2025-05-10T02:18:17.516797434Z" level=info msg="StopPodSandbox for \"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305\"" May 10 02:18:17.624946 env[1294]: 2025-05-10 02:18:17.574 [WARNING][3020] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"f9e49781-f94c-414e-a653-3b438954f981", ResourceVersion:"1423", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 2, 17, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.230.14.182", ContainerID:"5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec", Pod:"nginx-deployment-85f456d6dd-bwp85", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliea821e56abd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 02:18:17.624946 env[1294]: 2025-05-10 02:18:17.575 [INFO][3020] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" May 10 02:18:17.624946 env[1294]: 2025-05-10 02:18:17.575 [INFO][3020] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" iface="eth0" netns="" May 10 02:18:17.624946 env[1294]: 2025-05-10 02:18:17.576 [INFO][3020] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" May 10 02:18:17.624946 env[1294]: 2025-05-10 02:18:17.576 [INFO][3020] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" May 10 02:18:17.624946 env[1294]: 2025-05-10 02:18:17.610 [INFO][3027] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" HandleID="k8s-pod-network.2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" Workload="10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0" May 10 02:18:17.624946 env[1294]: 2025-05-10 02:18:17.611 [INFO][3027] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 02:18:17.624946 env[1294]: 2025-05-10 02:18:17.611 [INFO][3027] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 02:18:17.624946 env[1294]: 2025-05-10 02:18:17.620 [WARNING][3027] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" HandleID="k8s-pod-network.2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" Workload="10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0" May 10 02:18:17.624946 env[1294]: 2025-05-10 02:18:17.620 [INFO][3027] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" HandleID="k8s-pod-network.2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" Workload="10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0" May 10 02:18:17.624946 env[1294]: 2025-05-10 02:18:17.622 [INFO][3027] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 02:18:17.624946 env[1294]: 2025-05-10 02:18:17.623 [INFO][3020] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" May 10 02:18:17.626141 env[1294]: time="2025-05-10T02:18:17.626082172Z" level=info msg="TearDown network for sandbox \"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305\" successfully" May 10 02:18:17.626302 env[1294]: time="2025-05-10T02:18:17.626269804Z" level=info msg="StopPodSandbox for \"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305\" returns successfully" May 10 02:18:17.627345 env[1294]: time="2025-05-10T02:18:17.627296201Z" level=info msg="RemovePodSandbox for \"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305\"" May 10 02:18:17.627466 env[1294]: time="2025-05-10T02:18:17.627361407Z" level=info msg="Forcibly stopping sandbox \"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305\"" May 10 02:18:17.765607 env[1294]: 2025-05-10 02:18:17.707 [WARNING][3048] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"f9e49781-f94c-414e-a653-3b438954f981", ResourceVersion:"1423", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 2, 17, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.230.14.182", ContainerID:"5be410ca84e657c08ab27161f03ab9fef949018db82ee70dda1a26bb77bde9ec", Pod:"nginx-deployment-85f456d6dd-bwp85", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"caliea821e56abd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 02:18:17.765607 env[1294]: 2025-05-10 02:18:17.708 [INFO][3048] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" May 10 02:18:17.765607 env[1294]: 2025-05-10 02:18:17.708 [INFO][3048] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" iface="eth0" netns="" May 10 02:18:17.765607 env[1294]: 2025-05-10 02:18:17.708 [INFO][3048] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" May 10 02:18:17.765607 env[1294]: 2025-05-10 02:18:17.708 [INFO][3048] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" May 10 02:18:17.765607 env[1294]: 2025-05-10 02:18:17.745 [INFO][3055] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" HandleID="k8s-pod-network.2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" Workload="10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0" May 10 02:18:17.765607 env[1294]: 2025-05-10 02:18:17.745 [INFO][3055] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 02:18:17.765607 env[1294]: 2025-05-10 02:18:17.745 [INFO][3055] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 02:18:17.765607 env[1294]: 2025-05-10 02:18:17.755 [WARNING][3055] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" HandleID="k8s-pod-network.2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" Workload="10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0" May 10 02:18:17.765607 env[1294]: 2025-05-10 02:18:17.755 [INFO][3055] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" HandleID="k8s-pod-network.2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" Workload="10.230.14.182-k8s-nginx--deployment--85f456d6dd--bwp85-eth0" May 10 02:18:17.765607 env[1294]: 2025-05-10 02:18:17.761 [INFO][3055] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 02:18:17.765607 env[1294]: 2025-05-10 02:18:17.763 [INFO][3048] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305" May 10 02:18:17.765607 env[1294]: time="2025-05-10T02:18:17.764590657Z" level=info msg="TearDown network for sandbox \"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305\" successfully" May 10 02:18:17.769435 env[1294]: time="2025-05-10T02:18:17.769349504Z" level=info msg="RemovePodSandbox \"2286e00562acb1007cf423242e1a71f4b247167f790356dc7478105753c70305\" returns successfully" May 10 02:18:17.770151 env[1294]: time="2025-05-10T02:18:17.770102905Z" level=info msg="StopPodSandbox for \"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f\"" May 10 02:18:17.876966 env[1294]: 2025-05-10 02:18:17.822 [WARNING][3074] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.230.14.182-k8s-csi--node--driver--kgclv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"02a841c1-207b-46a9-ad09-03738472e3b5", ResourceVersion:"1382", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 2, 17, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.230.14.182", ContainerID:"5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e", Pod:"csi-node-driver-kgclv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.97.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9d675d099ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 02:18:17.876966 env[1294]: 2025-05-10 02:18:17.823 [INFO][3074] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" May 10 02:18:17.876966 env[1294]: 2025-05-10 02:18:17.823 [INFO][3074] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" iface="eth0" netns="" May 10 02:18:17.876966 env[1294]: 2025-05-10 02:18:17.823 [INFO][3074] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" May 10 02:18:17.876966 env[1294]: 2025-05-10 02:18:17.823 [INFO][3074] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" May 10 02:18:17.876966 env[1294]: 2025-05-10 02:18:17.857 [INFO][3081] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" HandleID="k8s-pod-network.5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" Workload="10.230.14.182-k8s-csi--node--driver--kgclv-eth0" May 10 02:18:17.876966 env[1294]: 2025-05-10 02:18:17.857 [INFO][3081] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 02:18:17.876966 env[1294]: 2025-05-10 02:18:17.857 [INFO][3081] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 02:18:17.876966 env[1294]: 2025-05-10 02:18:17.867 [WARNING][3081] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" HandleID="k8s-pod-network.5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" Workload="10.230.14.182-k8s-csi--node--driver--kgclv-eth0" May 10 02:18:17.876966 env[1294]: 2025-05-10 02:18:17.867 [INFO][3081] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" HandleID="k8s-pod-network.5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" Workload="10.230.14.182-k8s-csi--node--driver--kgclv-eth0" May 10 02:18:17.876966 env[1294]: 2025-05-10 02:18:17.874 [INFO][3081] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 02:18:17.876966 env[1294]: 2025-05-10 02:18:17.875 [INFO][3074] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" May 10 02:18:17.878001 env[1294]: time="2025-05-10T02:18:17.876985296Z" level=info msg="TearDown network for sandbox \"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f\" successfully" May 10 02:18:17.878001 env[1294]: time="2025-05-10T02:18:17.877029910Z" level=info msg="StopPodSandbox for \"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f\" returns successfully" May 10 02:18:17.878001 env[1294]: time="2025-05-10T02:18:17.877514761Z" level=info msg="RemovePodSandbox for \"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f\"" May 10 02:18:17.878001 env[1294]: time="2025-05-10T02:18:17.877552189Z" level=info msg="Forcibly stopping sandbox \"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f\"" May 10 02:18:17.974996 env[1294]: 2025-05-10 02:18:17.927 [WARNING][3099] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.230.14.182-k8s-csi--node--driver--kgclv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"02a841c1-207b-46a9-ad09-03738472e3b5", ResourceVersion:"1382", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 2, 17, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.230.14.182", ContainerID:"5346193b9be988c503fe7a139329658cc0d9d1b5ff1ba8700c530d59395a4f9e", Pod:"csi-node-driver-kgclv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.97.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9d675d099ec", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 02:18:17.974996 env[1294]: 2025-05-10 02:18:17.928 [INFO][3099] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" May 10 02:18:17.974996 env[1294]: 2025-05-10 02:18:17.928 [INFO][3099] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" iface="eth0" netns="" May 10 02:18:17.974996 env[1294]: 2025-05-10 02:18:17.928 [INFO][3099] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" May 10 02:18:17.974996 env[1294]: 2025-05-10 02:18:17.928 [INFO][3099] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" May 10 02:18:17.974996 env[1294]: 2025-05-10 02:18:17.955 [INFO][3106] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" HandleID="k8s-pod-network.5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" Workload="10.230.14.182-k8s-csi--node--driver--kgclv-eth0" May 10 02:18:17.974996 env[1294]: 2025-05-10 02:18:17.955 [INFO][3106] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 02:18:17.974996 env[1294]: 2025-05-10 02:18:17.955 [INFO][3106] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 02:18:17.974996 env[1294]: 2025-05-10 02:18:17.965 [WARNING][3106] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" HandleID="k8s-pod-network.5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" Workload="10.230.14.182-k8s-csi--node--driver--kgclv-eth0" May 10 02:18:17.974996 env[1294]: 2025-05-10 02:18:17.965 [INFO][3106] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" HandleID="k8s-pod-network.5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" Workload="10.230.14.182-k8s-csi--node--driver--kgclv-eth0" May 10 02:18:17.974996 env[1294]: 2025-05-10 02:18:17.972 [INFO][3106] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 02:18:17.974996 env[1294]: 2025-05-10 02:18:17.973 [INFO][3099] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f" May 10 02:18:17.976095 env[1294]: time="2025-05-10T02:18:17.975028585Z" level=info msg="TearDown network for sandbox \"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f\" successfully" May 10 02:18:17.978214 env[1294]: time="2025-05-10T02:18:17.978171910Z" level=info msg="RemovePodSandbox \"5eb9ee608c02f1a472690b90ef5c1f3a3d921778cde53faff16ad446c8e32a3f\" returns successfully" May 10 02:18:18.463524 kubelet[1647]: E0510 02:18:18.463456 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:19.464308 kubelet[1647]: E0510 02:18:19.464241 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:20.464567 kubelet[1647]: E0510 02:18:20.464491 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:21.390000 audit[3138]: NETFILTER_CFG table=filter:86 family=2 entries=20 op=nft_register_rule pid=3138 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:18:21.390000 audit[3138]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffd8bb9960 a2=0 a3=7fffd8bb994c items=0 ppid=1923 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:21.406481 kernel: audit: type=1325 audit(1746843501.390:380): table=filter:86 family=2 entries=20 op=nft_register_rule pid=3138 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:18:21.406607 kernel: audit: type=1300 audit(1746843501.390:380): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffd8bb9960 a2=0 a3=7fffd8bb994c items=0 ppid=1923 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:21.406696 kernel: audit: type=1327 audit(1746843501.390:380): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:18:21.390000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:18:21.411000 audit[3138]: NETFILTER_CFG table=nat:87 family=2 entries=22 op=nft_register_rule pid=3138 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:18:21.411000 audit[3138]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffd8bb9960 a2=0 a3=0 items=0 ppid=1923 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:21.424242 kernel: audit: type=1325 audit(1746843501.411:381): table=nat:87 family=2 entries=22 op=nft_register_rule pid=3138 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:18:21.424346 kernel: audit: type=1300 audit(1746843501.411:381): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffd8bb9960 a2=0 a3=0 items=0 ppid=1923 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:21.424948 kernel: audit: type=1327 audit(1746843501.411:381): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:18:21.411000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:18:21.439000 audit[3140]: NETFILTER_CFG table=filter:88 family=2 entries=32 op=nft_register_rule pid=3140 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:18:21.439000 audit[3140]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd538521d0 a2=0 a3=7ffd538521bc items=0 ppid=1923 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:21.452102 kernel: audit: type=1325 audit(1746843501.439:382): table=filter:88 family=2 entries=32 op=nft_register_rule pid=3140 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:18:21.452243 kernel: audit: type=1300 audit(1746843501.439:382): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd538521d0 a2=0 a3=7ffd538521bc items=0 ppid=1923 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:21.452310 kernel: audit: type=1327 audit(1746843501.439:382): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:18:21.439000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:18:21.451000 audit[3140]: NETFILTER_CFG table=nat:89 family=2 entries=22 op=nft_register_rule pid=3140 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:18:21.459988 kernel: audit: type=1325 audit(1746843501.451:383): table=nat:89 family=2 entries=22 op=nft_register_rule pid=3140 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:18:21.451000 audit[3140]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd538521d0 a2=0 a3=0 items=0 ppid=1923 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:21.451000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:18:21.466340 kubelet[1647]: E0510 02:18:21.466227 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:21.519485 kubelet[1647]: I0510 02:18:21.519401 1647 topology_manager.go:215] "Topology Admit Handler" podUID="7f674706-1d5d-479c-902d-03c1f30a5435" podNamespace="default" podName="nfs-server-provisioner-0" May 10 02:18:21.718852 kubelet[1647]: I0510 02:18:21.718585 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/7f674706-1d5d-479c-902d-03c1f30a5435-data\") pod \"nfs-server-provisioner-0\" (UID: \"7f674706-1d5d-479c-902d-03c1f30a5435\") " pod="default/nfs-server-provisioner-0" May 10 02:18:21.718852 kubelet[1647]: I0510 02:18:21.718728 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9qnfd\" (UniqueName: \"kubernetes.io/projected/7f674706-1d5d-479c-902d-03c1f30a5435-kube-api-access-9qnfd\") pod \"nfs-server-provisioner-0\" (UID: \"7f674706-1d5d-479c-902d-03c1f30a5435\") " pod="default/nfs-server-provisioner-0" May 10 02:18:22.126003 env[1294]: time="2025-05-10T02:18:22.125228622Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:7f674706-1d5d-479c-902d-03c1f30a5435,Namespace:default,Attempt:0,}" May 10 02:18:22.331308 systemd-networkd[1075]: cali60e51b789ff: Link UP May 10 02:18:22.337340 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 02:18:22.337500 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 10 02:18:22.337972 systemd-networkd[1075]: cali60e51b789ff: Gained carrier May 10 02:18:22.390073 env[1294]: 2025-05-10 02:18:22.193 [INFO][3143] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.230.14.182-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 7f674706-1d5d-479c-902d-03c1f30a5435 1471 0 2025-05-10 02:18:21 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.230.14.182 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.230.14.182-k8s-nfs--server--provisioner--0-" May 10 02:18:22.390073 env[1294]: 2025-05-10 02:18:22.193 [INFO][3143] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.230.14.182-k8s-nfs--server--provisioner--0-eth0" May 10 02:18:22.390073 env[1294]: 2025-05-10 02:18:22.235 [INFO][3155] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b" HandleID="k8s-pod-network.0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b" Workload="10.230.14.182-k8s-nfs--server--provisioner--0-eth0" May 10 02:18:22.390073 env[1294]: 2025-05-10 02:18:22.256 [INFO][3155] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b" HandleID="k8s-pod-network.0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b" Workload="10.230.14.182-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ed430), Attrs:map[string]string{"namespace":"default", "node":"10.230.14.182", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-10 02:18:22.235207837 +0000 UTC"}, Hostname:"10.230.14.182", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 02:18:22.390073 env[1294]: 2025-05-10 02:18:22.256 [INFO][3155] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 02:18:22.390073 env[1294]: 2025-05-10 02:18:22.256 [INFO][3155] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 02:18:22.390073 env[1294]: 2025-05-10 02:18:22.256 [INFO][3155] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.230.14.182' May 10 02:18:22.390073 env[1294]: 2025-05-10 02:18:22.262 [INFO][3155] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b" host="10.230.14.182" May 10 02:18:22.390073 env[1294]: 2025-05-10 02:18:22.278 [INFO][3155] ipam/ipam.go 372: Looking up existing affinities for host host="10.230.14.182" May 10 02:18:22.390073 env[1294]: 2025-05-10 02:18:22.294 [INFO][3155] ipam/ipam.go 489: Trying affinity for 192.168.97.128/26 host="10.230.14.182" May 10 02:18:22.390073 env[1294]: 2025-05-10 02:18:22.298 [INFO][3155] ipam/ipam.go 155: Attempting to load block cidr=192.168.97.128/26 host="10.230.14.182" May 10 02:18:22.390073 env[1294]: 2025-05-10 02:18:22.302 [INFO][3155] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.97.128/26 host="10.230.14.182" May 10 02:18:22.390073 env[1294]: 2025-05-10 02:18:22.302 [INFO][3155] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.97.128/26 handle="k8s-pod-network.0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b" host="10.230.14.182" May 10 02:18:22.390073 env[1294]: 2025-05-10 02:18:22.304 [INFO][3155] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b May 10 02:18:22.390073 env[1294]: 2025-05-10 02:18:22.311 [INFO][3155] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.97.128/26 handle="k8s-pod-network.0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b" host="10.230.14.182" May 10 02:18:22.390073 env[1294]: 2025-05-10 02:18:22.324 [INFO][3155] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.97.131/26] block=192.168.97.128/26 handle="k8s-pod-network.0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b" host="10.230.14.182" May 10 02:18:22.390073 env[1294]: 2025-05-10 02:18:22.325 [INFO][3155] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.97.131/26] handle="k8s-pod-network.0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b" host="10.230.14.182" May 10 02:18:22.390073 env[1294]: 2025-05-10 02:18:22.325 [INFO][3155] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 02:18:22.390073 env[1294]: 2025-05-10 02:18:22.325 [INFO][3155] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.97.131/26] IPv6=[] ContainerID="0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b" HandleID="k8s-pod-network.0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b" Workload="10.230.14.182-k8s-nfs--server--provisioner--0-eth0" May 10 02:18:22.391485 env[1294]: 2025-05-10 02:18:22.326 [INFO][3143] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.230.14.182-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.230.14.182-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"7f674706-1d5d-479c-902d-03c1f30a5435", ResourceVersion:"1471", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 2, 18, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.230.14.182", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.97.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 02:18:22.391485 env[1294]: 2025-05-10 02:18:22.327 [INFO][3143] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.97.131/32] ContainerID="0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.230.14.182-k8s-nfs--server--provisioner--0-eth0" May 10 02:18:22.391485 env[1294]: 2025-05-10 02:18:22.327 [INFO][3143] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.230.14.182-k8s-nfs--server--provisioner--0-eth0" May 10 02:18:22.391485 env[1294]: 2025-05-10 02:18:22.338 [INFO][3143] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.230.14.182-k8s-nfs--server--provisioner--0-eth0" May 10 02:18:22.391831 env[1294]: 2025-05-10 02:18:22.341 [INFO][3143] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.230.14.182-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.230.14.182-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"7f674706-1d5d-479c-902d-03c1f30a5435", ResourceVersion:"1471", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 2, 18, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.230.14.182", ContainerID:"0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.97.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"0a:f6:c0:90:b1:9b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 02:18:22.391831 env[1294]: 2025-05-10 02:18:22.382 [INFO][3143] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.230.14.182-k8s-nfs--server--provisioner--0-eth0" May 10 02:18:22.391000 audit[3168]: NETFILTER_CFG table=filter:90 family=2 entries=38 op=nft_register_chain pid=3168 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 02:18:22.391000 audit[3168]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffdcaf5ae10 a2=0 a3=7ffdcaf5adfc items=0 ppid=2489 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:22.391000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 02:18:22.411008 env[1294]: time="2025-05-10T02:18:22.410699956Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 02:18:22.411008 env[1294]: time="2025-05-10T02:18:22.410767768Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 02:18:22.411008 env[1294]: time="2025-05-10T02:18:22.410786864Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 02:18:22.411401 env[1294]: time="2025-05-10T02:18:22.411074005Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b pid=3185 runtime=io.containerd.runc.v2 May 10 02:18:22.466644 kubelet[1647]: E0510 02:18:22.466587 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:22.506857 env[1294]: time="2025-05-10T02:18:22.506766439Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:7f674706-1d5d-479c-902d-03c1f30a5435,Namespace:default,Attempt:0,} returns sandbox id \"0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b\"" May 10 02:18:22.509565 env[1294]: time="2025-05-10T02:18:22.509528250Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 10 02:18:22.838552 systemd[1]: run-containerd-runc-k8s.io-0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b-runc.d8gaO8.mount: Deactivated successfully. May 10 02:18:23.467389 kubelet[1647]: E0510 02:18:23.467303 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:23.754687 systemd-networkd[1075]: cali60e51b789ff: Gained IPv6LL May 10 02:18:24.468401 kubelet[1647]: E0510 02:18:24.468222 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:25.469296 kubelet[1647]: E0510 02:18:25.469185 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:26.470214 kubelet[1647]: E0510 02:18:26.470132 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:27.470985 kubelet[1647]: E0510 02:18:27.470899 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:27.839682 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4155012371.mount: Deactivated successfully. May 10 02:18:28.471278 kubelet[1647]: E0510 02:18:28.471213 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:29.471654 kubelet[1647]: E0510 02:18:29.471549 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:30.472258 kubelet[1647]: E0510 02:18:30.472173 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:31.362626 env[1294]: time="2025-05-10T02:18:31.362303843Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:18:31.365019 env[1294]: time="2025-05-10T02:18:31.364976328Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:18:31.367394 env[1294]: time="2025-05-10T02:18:31.367356963Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:18:31.369831 env[1294]: time="2025-05-10T02:18:31.369792195Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:18:31.371131 env[1294]: time="2025-05-10T02:18:31.371090361Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 10 02:18:31.376142 env[1294]: time="2025-05-10T02:18:31.376023118Z" level=info msg="CreateContainer within sandbox \"0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 10 02:18:31.391195 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1616238931.mount: Deactivated successfully. May 10 02:18:31.398979 env[1294]: time="2025-05-10T02:18:31.398932520Z" level=info msg="CreateContainer within sandbox \"0e24f0ca6d1475e0f2bd14de9a7ac98826a09d4404f5a8b44c94b2556f3d253b\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"7172f91aff22af2911534c9efce08a13b34421ccd75bd74d59f5d0e497b2d629\"" May 10 02:18:31.399904 env[1294]: time="2025-05-10T02:18:31.399869717Z" level=info msg="StartContainer for \"7172f91aff22af2911534c9efce08a13b34421ccd75bd74d59f5d0e497b2d629\"" May 10 02:18:31.473330 kubelet[1647]: E0510 02:18:31.473261 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:31.503249 env[1294]: time="2025-05-10T02:18:31.503188317Z" level=info msg="StartContainer for \"7172f91aff22af2911534c9efce08a13b34421ccd75bd74d59f5d0e497b2d629\" returns successfully" May 10 02:18:31.908443 kubelet[1647]: I0510 02:18:31.908169 1647 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.043500891 podStartE2EDuration="10.908145621s" podCreationTimestamp="2025-05-10 02:18:21 +0000 UTC" firstStartedPulling="2025-05-10 02:18:22.508860049 +0000 UTC m=+65.730524382" lastFinishedPulling="2025-05-10 02:18:31.373504778 +0000 UTC m=+74.595169112" observedRunningTime="2025-05-10 02:18:31.907815918 +0000 UTC m=+75.129480265" watchObservedRunningTime="2025-05-10 02:18:31.908145621 +0000 UTC m=+75.129809971" May 10 02:18:31.930000 audit[3311]: NETFILTER_CFG table=filter:91 family=2 entries=20 op=nft_register_rule pid=3311 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:18:31.938447 kernel: kauditd_printk_skb: 5 callbacks suppressed May 10 02:18:31.938549 kernel: audit: type=1325 audit(1746843511.930:385): table=filter:91 family=2 entries=20 op=nft_register_rule pid=3311 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:18:31.930000 audit[3311]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff65184ac0 a2=0 a3=7fff65184aac items=0 ppid=1923 pid=3311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:31.949173 kernel: audit: type=1300 audit(1746843511.930:385): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff65184ac0 a2=0 a3=7fff65184aac items=0 ppid=1923 pid=3311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:31.949271 kernel: audit: type=1327 audit(1746843511.930:385): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:18:31.930000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:18:31.956000 audit[3311]: NETFILTER_CFG table=nat:92 family=2 entries=106 op=nft_register_chain pid=3311 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:18:31.956000 audit[3311]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff65184ac0 a2=0 a3=7fff65184aac items=0 ppid=1923 pid=3311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:31.970273 kernel: audit: type=1325 audit(1746843511.956:386): table=nat:92 family=2 entries=106 op=nft_register_chain pid=3311 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 02:18:31.970391 kernel: audit: type=1300 audit(1746843511.956:386): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff65184ac0 a2=0 a3=7fff65184aac items=0 ppid=1923 pid=3311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:31.970491 kernel: audit: type=1327 audit(1746843511.956:386): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:18:31.956000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 02:18:32.474306 kubelet[1647]: E0510 02:18:32.474240 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:33.475399 kubelet[1647]: E0510 02:18:33.475312 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:34.475944 kubelet[1647]: E0510 02:18:34.475817 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:35.476576 kubelet[1647]: E0510 02:18:35.476507 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:36.477626 kubelet[1647]: E0510 02:18:36.477520 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:37.401153 kubelet[1647]: E0510 02:18:37.401094 1647 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:37.479335 kubelet[1647]: E0510 02:18:37.479273 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:38.480893 kubelet[1647]: E0510 02:18:38.480816 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:39.482038 kubelet[1647]: E0510 02:18:39.481963 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:40.483368 kubelet[1647]: E0510 02:18:40.483281 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:41.483806 kubelet[1647]: E0510 02:18:41.483755 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:41.619852 kubelet[1647]: I0510 02:18:41.619796 1647 topology_manager.go:215] "Topology Admit Handler" podUID="52b9ab0b-272c-4246-9fd8-77fd41973ba3" podNamespace="default" podName="test-pod-1" May 10 02:18:41.660059 kubelet[1647]: I0510 02:18:41.660001 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-41a041aa-4f48-43cf-80ec-182e78b2cfac\" (UniqueName: \"kubernetes.io/nfs/52b9ab0b-272c-4246-9fd8-77fd41973ba3-pvc-41a041aa-4f48-43cf-80ec-182e78b2cfac\") pod \"test-pod-1\" (UID: \"52b9ab0b-272c-4246-9fd8-77fd41973ba3\") " pod="default/test-pod-1" May 10 02:18:41.660444 kubelet[1647]: I0510 02:18:41.660390 1647 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qrsv7\" (UniqueName: \"kubernetes.io/projected/52b9ab0b-272c-4246-9fd8-77fd41973ba3-kube-api-access-qrsv7\") pod \"test-pod-1\" (UID: \"52b9ab0b-272c-4246-9fd8-77fd41973ba3\") " pod="default/test-pod-1" May 10 02:18:41.794000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.806576 kernel: Failed to create system directory netfs May 10 02:18:41.806690 kernel: audit: type=1400 audit(1746843521.794:387): avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.811013 kernel: Failed to create system directory netfs May 10 02:18:41.811111 kernel: audit: type=1400 audit(1746843521.794:387): avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.794000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.817875 kernel: Failed to create system directory netfs May 10 02:18:41.817954 kernel: audit: type=1400 audit(1746843521.794:387): avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.794000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.825001 kernel: Failed to create system directory netfs May 10 02:18:41.825091 kernel: audit: type=1400 audit(1746843521.794:387): avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.794000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.794000 audit[3324]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5584748ba5e0 a1=153bc a2=5584401bf2b0 a3=5 items=0 ppid=499 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:41.794000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 02:18:41.847570 kernel: audit: type=1300 audit(1746843521.794:387): arch=c000003e syscall=175 success=yes exit=0 a0=5584748ba5e0 a1=153bc a2=5584401bf2b0 a3=5 items=0 ppid=499 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:41.847692 kernel: audit: type=1327 audit(1746843521.794:387): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 02:18:41.864753 kernel: Failed to create system directory fscache May 10 02:18:41.864851 kernel: audit: type=1400 audit(1746843521.851:388): avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.864924 kernel: Failed to create system directory fscache May 10 02:18:41.851000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.871723 kernel: audit: type=1400 audit(1746843521.851:388): avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.871781 kernel: Failed to create system directory fscache May 10 02:18:41.851000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.878750 kernel: audit: type=1400 audit(1746843521.851:388): avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.878822 kernel: Failed to create system directory fscache May 10 02:18:41.851000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.885784 kernel: audit: type=1400 audit(1746843521.851:388): avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.885848 kernel: Failed to create system directory fscache May 10 02:18:41.851000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.851000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.851000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.888606 kernel: Failed to create system directory fscache May 10 02:18:41.888728 kernel: Failed to create system directory fscache May 10 02:18:41.851000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.851000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.891513 kernel: Failed to create system directory fscache May 10 02:18:41.851000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.892987 kernel: Failed to create system directory fscache May 10 02:18:41.893086 kernel: Failed to create system directory fscache May 10 02:18:41.851000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.851000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.851000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.897322 kernel: Failed to create system directory fscache May 10 02:18:41.897442 kernel: Failed to create system directory fscache May 10 02:18:41.897494 kernel: Failed to create system directory fscache May 10 02:18:41.851000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.851000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.900244 kernel: Failed to create system directory fscache May 10 02:18:41.903445 kernel: FS-Cache: Loaded May 10 02:18:41.851000 audit[3324]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558474acf9c0 a1=4c0fc a2=5584401bf2b0 a3=5 items=0 ppid=499 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:41.851000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.958964 kernel: Failed to create system directory sunrpc May 10 02:18:41.959522 kernel: Failed to create system directory sunrpc May 10 02:18:41.959588 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.960391 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.963144 kernel: Failed to create system directory sunrpc May 10 02:18:41.963220 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.964490 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.967242 kernel: Failed to create system directory sunrpc May 10 02:18:41.967316 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.970056 kernel: Failed to create system directory sunrpc May 10 02:18:41.970154 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.971440 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.972725 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.974142 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.975519 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.978273 kernel: Failed to create system directory sunrpc May 10 02:18:41.978372 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.979527 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.980929 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.982348 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.983620 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.985101 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.986434 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.987804 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.989141 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.990395 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.991843 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.993220 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.994534 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.995889 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.998622 kernel: Failed to create system directory sunrpc May 10 02:18:41.998765 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.000128 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.002841 kernel: Failed to create system directory sunrpc May 10 02:18:42.002960 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.004184 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.005513 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.006812 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.008248 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.009512 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.010933 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.015497 kernel: Failed to create system directory sunrpc May 10 02:18:42.015580 kernel: Failed to create system directory sunrpc May 10 02:18:42.015654 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.016830 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.018298 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.019750 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.021028 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.022495 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.023824 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.028389 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.029548 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.030892 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.032448 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.033754 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.035146 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.036530 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.037899 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.039177 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.040577 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.041915 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.043348 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.044654 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.046120 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.047462 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.048735 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.050140 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.051514 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.052806 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.054234 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.055593 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.057040 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.058345 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.061026 kernel: Failed to create system directory sunrpc May 10 02:18:42.061143 kernel: Failed to create system directory sunrpc May 10 02:18:42.066561 kernel: Failed to create system directory sunrpc May 10 02:18:42.066656 kernel: Failed to create system directory sunrpc May 10 02:18:42.066714 kernel: Failed to create system directory sunrpc May 10 02:18:42.066776 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.067814 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.069337 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.070782 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.072018 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.073399 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.074756 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.076143 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.077483 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.078782 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.093687 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.095111 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.096485 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.097829 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.099157 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.100556 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.101922 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.103338 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.104652 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.106114 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.107495 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.108849 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.110226 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.111533 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.112825 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.114288 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.115649 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.116935 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.118389 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.119824 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.121193 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.122585 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.123957 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.125304 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.126654 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.128047 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.129394 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.130807 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.132188 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.134141 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.136351 kernel: Failed to create system directory sunrpc May 10 02:18:42.136500 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.137702 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.139188 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.140479 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.143333 kernel: Failed to create system directory sunrpc May 10 02:18:42.143443 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.144726 kernel: Failed to create system directory sunrpc May 10 02:18:41.936000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.158179 kernel: RPC: Registered named UNIX socket transport module. May 10 02:18:42.158336 kernel: RPC: Registered udp transport module. May 10 02:18:42.158397 kernel: RPC: Registered tcp transport module. May 10 02:18:42.159481 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 10 02:18:41.936000 audit[3324]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558474b1bad0 a1=1a814c a2=5584401bf2b0 a3=5 items=6 ppid=499 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:41.936000 audit: CWD cwd="/" May 10 02:18:41.936000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:18:41.936000 audit: PATH item=1 name=(null) inode=25804 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:18:41.936000 audit: PATH item=2 name=(null) inode=25804 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:18:41.936000 audit: PATH item=3 name=(null) inode=25805 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:18:41.936000 audit: PATH item=4 name=(null) inode=25804 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:18:41.936000 audit: PATH item=5 name=(null) inode=25806 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 02:18:41.936000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.228906 kernel: Failed to create system directory nfs May 10 02:18:42.228994 kernel: Failed to create system directory nfs May 10 02:18:42.229051 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.231733 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.233282 kernel: Failed to create system directory nfs May 10 02:18:42.233361 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.235935 kernel: Failed to create system directory nfs May 10 02:18:42.236009 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.237279 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.239940 kernel: Failed to create system directory nfs May 10 02:18:42.240017 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.241298 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.243958 kernel: Failed to create system directory nfs May 10 02:18:42.244054 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.245318 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.247876 kernel: Failed to create system directory nfs May 10 02:18:42.247996 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.249206 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.251826 kernel: Failed to create system directory nfs May 10 02:18:42.251910 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.253144 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.254464 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.257089 kernel: Failed to create system directory nfs May 10 02:18:42.257168 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.258365 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.261027 kernel: Failed to create system directory nfs May 10 02:18:42.261100 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.262400 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.265153 kernel: Failed to create system directory nfs May 10 02:18:42.265255 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.267847 kernel: Failed to create system directory nfs May 10 02:18:42.268049 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.270582 kernel: Failed to create system directory nfs May 10 02:18:42.270650 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.273265 kernel: Failed to create system directory nfs May 10 02:18:42.273352 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.275880 kernel: Failed to create system directory nfs May 10 02:18:42.275961 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.277255 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.279855 kernel: Failed to create system directory nfs May 10 02:18:42.279949 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.282529 kernel: Failed to create system directory nfs May 10 02:18:42.282597 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.285170 kernel: Failed to create system directory nfs May 10 02:18:42.285235 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.287793 kernel: Failed to create system directory nfs May 10 02:18:42.287867 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.289100 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.290428 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.293064 kernel: Failed to create system directory nfs May 10 02:18:42.293142 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.294389 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.295724 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.297038 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.298333 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.300925 kernel: Failed to create system directory nfs May 10 02:18:42.300997 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.302319 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.303599 kernel: Failed to create system directory nfs May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.211000 audit[3324]: AVC avc: denied { confidentiality } for pid=3324 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.306240 kernel: Failed to create system directory nfs May 10 02:18:42.334446 kernel: FS-Cache: Netfs 'nfs' registered for caching May 10 02:18:42.211000 audit[3324]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558474d3ca10 a1=16eae4 a2=5584401bf2b0 a3=5 items=0 ppid=499 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:42.211000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.401377 kernel: Failed to create system directory nfs4 May 10 02:18:42.401521 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.404598 kernel: Failed to create system directory nfs4 May 10 02:18:42.404672 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.406201 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.407822 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.409341 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.412299 kernel: Failed to create system directory nfs4 May 10 02:18:42.412371 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.415392 kernel: Failed to create system directory nfs4 May 10 02:18:42.415478 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.418400 kernel: Failed to create system directory nfs4 May 10 02:18:42.418485 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.421451 kernel: Failed to create system directory nfs4 May 10 02:18:42.421529 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.423022 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.424544 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.426065 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.427633 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.429173 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.430704 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.432273 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.435299 kernel: Failed to create system directory nfs4 May 10 02:18:42.435369 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.438365 kernel: Failed to create system directory nfs4 May 10 02:18:42.438440 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.441366 kernel: Failed to create system directory nfs4 May 10 02:18:42.441433 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.444455 kernel: Failed to create system directory nfs4 May 10 02:18:42.444519 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.445445 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.447531 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.448983 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.450497 kernel: Failed to create system directory nfs4 May 10 02:18:42.450592 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.453393 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.456339 kernel: Failed to create system directory nfs4 May 10 02:18:42.456441 kernel: Failed to create system directory nfs4 May 10 02:18:42.456484 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.459117 kernel: Failed to create system directory nfs4 May 10 02:18:42.459636 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.462196 kernel: Failed to create system directory nfs4 May 10 02:18:42.462261 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.465041 kernel: Failed to create system directory nfs4 May 10 02:18:42.465182 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.466364 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.469158 kernel: Failed to create system directory nfs4 May 10 02:18:42.469483 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.470467 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.471787 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.473243 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.474479 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.475900 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.477276 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.480076 kernel: Failed to create system directory nfs4 May 10 02:18:42.480168 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.481338 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.484035 kernel: Failed to create system directory nfs4 May 10 02:18:42.484168 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.485394 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.485588 kubelet[1647]: E0510 02:18:42.485159 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.488105 kernel: Failed to create system directory nfs4 May 10 02:18:42.488205 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.489342 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.492588 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.494170 kernel: Failed to create system directory nfs4 May 10 02:18:42.494265 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.495532 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.498208 kernel: Failed to create system directory nfs4 May 10 02:18:42.498336 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.499507 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.502241 kernel: Failed to create system directory nfs4 May 10 02:18:42.502305 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.503529 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.506224 kernel: Failed to create system directory nfs4 May 10 02:18:42.506318 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.507549 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.508836 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.523640 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.526347 kernel: Failed to create system directory nfs4 May 10 02:18:42.526483 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.528943 kernel: Failed to create system directory nfs4 May 10 02:18:42.529060 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.531589 kernel: Failed to create system directory nfs4 May 10 02:18:42.531672 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.534343 kernel: Failed to create system directory nfs4 May 10 02:18:42.534471 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.537067 kernel: Failed to create system directory nfs4 May 10 02:18:42.537158 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.538527 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.541257 kernel: Failed to create system directory nfs4 May 10 02:18:42.541369 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.542543 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.545241 kernel: Failed to create system directory nfs4 May 10 02:18:42.545363 kernel: Failed to create system directory nfs4 May 10 02:18:42.377000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.699711 kernel: NFS: Registering the id_resolver key type May 10 02:18:42.699962 kernel: Key type id_resolver registered May 10 02:18:42.700055 kernel: Key type id_legacy registered May 10 02:18:42.377000 audit[3329]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f383387d010 a1=209404 a2=564c27df72b0 a3=5 items=0 ppid=499 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:42.377000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.722477 kernel: Failed to create system directory rpcgss May 10 02:18:42.722595 kernel: Failed to create system directory rpcgss May 10 02:18:42.722672 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.723669 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.725136 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.726497 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.727878 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.729182 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.730573 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.731946 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.733337 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.734665 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.736076 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.737507 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.738801 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.740240 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.741544 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.742992 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.744378 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.745689 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.747166 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.748525 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.749774 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.751221 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.752516 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.753948 kernel: Failed to create system directory rpcgss May 10 02:18:42.713000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 02:18:42.713000 audit[3332]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7ff57d664010 a1=70b64 a2=55f5e14ed2b0 a3=5 items=0 ppid=499 pid=3332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:42.713000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 10 02:18:42.794196 nfsidmap[3339]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'gb1.brightbox.com' May 10 02:18:42.800712 nfsidmap[3342]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'gb1.brightbox.com' May 10 02:18:42.814000 audit[1397]: AVC avc: denied { watch_reads } for pid=1397 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2528 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 02:18:42.814000 audit[1397]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=5652c9052b80 a2=10 a3=7d8757eaa0d9a669 items=0 ppid=1 pid=1397 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:42.814000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 10 02:18:42.814000 audit[1397]: AVC avc: denied { watch_reads } for pid=1397 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2528 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 02:18:42.814000 audit[1397]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=5652c9052b80 a2=10 a3=7d8757eaa0d9a669 items=0 ppid=1 pid=1397 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:42.814000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 10 02:18:42.815000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2528 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 02:18:42.815000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2528 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 02:18:42.815000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2528 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 10 02:18:42.826796 env[1294]: time="2025-05-10T02:18:42.825617847Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:52b9ab0b-272c-4246-9fd8-77fd41973ba3,Namespace:default,Attempt:0,}" May 10 02:18:43.024044 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 02:18:43.024233 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 10 02:18:43.017824 systemd-networkd[1075]: cali5ec59c6bf6e: Link UP May 10 02:18:43.023690 systemd-networkd[1075]: cali5ec59c6bf6e: Gained carrier May 10 02:18:43.046212 env[1294]: 2025-05-10 02:18:42.902 [INFO][3346] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.230.14.182-k8s-test--pod--1-eth0 default 52b9ab0b-272c-4246-9fd8-77fd41973ba3 1545 0 2025-05-10 02:18:24 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.230.14.182 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.230.14.182-k8s-test--pod--1-" May 10 02:18:43.046212 env[1294]: 2025-05-10 02:18:42.902 [INFO][3346] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.230.14.182-k8s-test--pod--1-eth0" May 10 02:18:43.046212 env[1294]: 2025-05-10 02:18:42.949 [INFO][3357] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687" HandleID="k8s-pod-network.1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687" Workload="10.230.14.182-k8s-test--pod--1-eth0" May 10 02:18:43.046212 env[1294]: 2025-05-10 02:18:42.963 [INFO][3357] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687" HandleID="k8s-pod-network.1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687" Workload="10.230.14.182-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000281a10), Attrs:map[string]string{"namespace":"default", "node":"10.230.14.182", "pod":"test-pod-1", "timestamp":"2025-05-10 02:18:42.948999734 +0000 UTC"}, Hostname:"10.230.14.182", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 02:18:43.046212 env[1294]: 2025-05-10 02:18:42.963 [INFO][3357] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 02:18:43.046212 env[1294]: 2025-05-10 02:18:42.963 [INFO][3357] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 02:18:43.046212 env[1294]: 2025-05-10 02:18:42.963 [INFO][3357] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.230.14.182' May 10 02:18:43.046212 env[1294]: 2025-05-10 02:18:42.969 [INFO][3357] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687" host="10.230.14.182" May 10 02:18:43.046212 env[1294]: 2025-05-10 02:18:42.977 [INFO][3357] ipam/ipam.go 372: Looking up existing affinities for host host="10.230.14.182" May 10 02:18:43.046212 env[1294]: 2025-05-10 02:18:42.983 [INFO][3357] ipam/ipam.go 489: Trying affinity for 192.168.97.128/26 host="10.230.14.182" May 10 02:18:43.046212 env[1294]: 2025-05-10 02:18:42.986 [INFO][3357] ipam/ipam.go 155: Attempting to load block cidr=192.168.97.128/26 host="10.230.14.182" May 10 02:18:43.046212 env[1294]: 2025-05-10 02:18:42.990 [INFO][3357] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.97.128/26 host="10.230.14.182" May 10 02:18:43.046212 env[1294]: 2025-05-10 02:18:42.991 [INFO][3357] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.97.128/26 handle="k8s-pod-network.1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687" host="10.230.14.182" May 10 02:18:43.046212 env[1294]: 2025-05-10 02:18:42.993 [INFO][3357] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687 May 10 02:18:43.046212 env[1294]: 2025-05-10 02:18:42.998 [INFO][3357] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.97.128/26 handle="k8s-pod-network.1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687" host="10.230.14.182" May 10 02:18:43.046212 env[1294]: 2025-05-10 02:18:43.008 [INFO][3357] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.97.132/26] block=192.168.97.128/26 handle="k8s-pod-network.1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687" host="10.230.14.182" May 10 02:18:43.046212 env[1294]: 2025-05-10 02:18:43.008 [INFO][3357] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.97.132/26] handle="k8s-pod-network.1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687" host="10.230.14.182" May 10 02:18:43.046212 env[1294]: 2025-05-10 02:18:43.008 [INFO][3357] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 02:18:43.046212 env[1294]: 2025-05-10 02:18:43.008 [INFO][3357] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.97.132/26] IPv6=[] ContainerID="1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687" HandleID="k8s-pod-network.1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687" Workload="10.230.14.182-k8s-test--pod--1-eth0" May 10 02:18:43.046212 env[1294]: 2025-05-10 02:18:43.011 [INFO][3346] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.230.14.182-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.230.14.182-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"52b9ab0b-272c-4246-9fd8-77fd41973ba3", ResourceVersion:"1545", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 2, 18, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.230.14.182", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 02:18:43.048082 env[1294]: 2025-05-10 02:18:43.011 [INFO][3346] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.97.132/32] ContainerID="1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.230.14.182-k8s-test--pod--1-eth0" May 10 02:18:43.048082 env[1294]: 2025-05-10 02:18:43.011 [INFO][3346] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.230.14.182-k8s-test--pod--1-eth0" May 10 02:18:43.048082 env[1294]: 2025-05-10 02:18:43.026 [INFO][3346] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.230.14.182-k8s-test--pod--1-eth0" May 10 02:18:43.048082 env[1294]: 2025-05-10 02:18:43.027 [INFO][3346] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.230.14.182-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.230.14.182-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"52b9ab0b-272c-4246-9fd8-77fd41973ba3", ResourceVersion:"1545", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 2, 18, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.230.14.182", ContainerID:"1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.97.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"f6:ca:05:dc:0d:63", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 02:18:43.048082 env[1294]: 2025-05-10 02:18:43.042 [INFO][3346] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.230.14.182-k8s-test--pod--1-eth0" May 10 02:18:43.057000 audit[3375]: NETFILTER_CFG table=filter:93 family=2 entries=38 op=nft_register_chain pid=3375 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 02:18:43.057000 audit[3375]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffc34973ed0 a2=0 a3=7ffc34973ebc items=0 ppid=2489 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 02:18:43.057000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 02:18:43.073618 env[1294]: time="2025-05-10T02:18:43.073406059Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 02:18:43.073618 env[1294]: time="2025-05-10T02:18:43.073571161Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 02:18:43.073929 env[1294]: time="2025-05-10T02:18:43.073590291Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 02:18:43.074238 env[1294]: time="2025-05-10T02:18:43.074058368Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687 pid=3387 runtime=io.containerd.runc.v2 May 10 02:18:43.181297 env[1294]: time="2025-05-10T02:18:43.181243454Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:52b9ab0b-272c-4246-9fd8-77fd41973ba3,Namespace:default,Attempt:0,} returns sandbox id \"1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687\"" May 10 02:18:43.187946 env[1294]: time="2025-05-10T02:18:43.187890585Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 10 02:18:43.485853 kubelet[1647]: E0510 02:18:43.485753 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:43.557111 env[1294]: time="2025-05-10T02:18:43.557048064Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:18:43.558856 env[1294]: time="2025-05-10T02:18:43.558821672Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:18:43.561130 env[1294]: time="2025-05-10T02:18:43.561092105Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:18:43.563786 env[1294]: time="2025-05-10T02:18:43.563718483Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 02:18:43.565049 env[1294]: time="2025-05-10T02:18:43.565008110Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 10 02:18:43.569409 env[1294]: time="2025-05-10T02:18:43.569358287Z" level=info msg="CreateContainer within sandbox \"1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 10 02:18:43.583484 env[1294]: time="2025-05-10T02:18:43.583434063Z" level=info msg="CreateContainer within sandbox \"1258de4cef72f1b1914f8576b140ebe5be9aa8481d7a30176f5224b82ebfc687\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"e24e2672f238e22232c55ff9b9a11cfa4fadcc9371b7a0bc16476db5394167ca\"" May 10 02:18:43.584359 env[1294]: time="2025-05-10T02:18:43.584314915Z" level=info msg="StartContainer for \"e24e2672f238e22232c55ff9b9a11cfa4fadcc9371b7a0bc16476db5394167ca\"" May 10 02:18:43.657508 env[1294]: time="2025-05-10T02:18:43.657432791Z" level=info msg="StartContainer for \"e24e2672f238e22232c55ff9b9a11cfa4fadcc9371b7a0bc16476db5394167ca\" returns successfully" May 10 02:18:44.486788 kubelet[1647]: E0510 02:18:44.486722 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:44.932561 systemd-networkd[1075]: cali5ec59c6bf6e: Gained IPv6LL May 10 02:18:45.488295 kubelet[1647]: E0510 02:18:45.488240 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:46.490409 kubelet[1647]: E0510 02:18:46.490348 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:47.491703 kubelet[1647]: E0510 02:18:47.491636 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:48.492939 kubelet[1647]: E0510 02:18:48.492827 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:49.493457 kubelet[1647]: E0510 02:18:49.493316 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:50.493574 kubelet[1647]: E0510 02:18:50.493517 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:51.494567 kubelet[1647]: E0510 02:18:51.494427 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 10 02:18:52.495715 kubelet[1647]: E0510 02:18:52.495607 1647 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"