May 13 08:41:15.927300 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon May 12 23:08:12 -00 2025 May 13 08:41:15.927339 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 08:41:15.927356 kernel: BIOS-provided physical RAM map: May 13 08:41:15.927374 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 13 08:41:15.927386 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 13 08:41:15.927398 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 13 08:41:15.927413 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdcfff] usable May 13 08:41:15.927426 kernel: BIOS-e820: [mem 0x00000000bffdd000-0x00000000bfffffff] reserved May 13 08:41:15.927438 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 13 08:41:15.927451 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 13 08:41:15.927463 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable May 13 08:41:15.927475 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved May 13 08:41:15.927490 kernel: NX (Execute Disable) protection: active May 13 08:41:15.927503 kernel: SMBIOS 3.0.0 present. May 13 08:41:15.927518 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.16.3-debian-1.16.3-2 04/01/2014 May 13 08:41:15.927531 kernel: Hypervisor detected: KVM May 13 08:41:15.927544 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 13 08:41:15.927557 kernel: kvm-clock: cpu 0, msr 15196001, primary cpu clock May 13 08:41:15.927573 kernel: kvm-clock: using sched offset of 3884259353 cycles May 13 08:41:15.927588 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 13 08:41:15.927601 kernel: tsc: Detected 1996.249 MHz processor May 13 08:41:15.927616 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 13 08:41:15.927630 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 13 08:41:15.927644 kernel: last_pfn = 0x140000 max_arch_pfn = 0x400000000 May 13 08:41:15.927657 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 13 08:41:15.927671 kernel: last_pfn = 0xbffdd max_arch_pfn = 0x400000000 May 13 08:41:15.927684 kernel: ACPI: Early table checksum verification disabled May 13 08:41:15.927700 kernel: ACPI: RSDP 0x00000000000F51E0 000014 (v00 BOCHS ) May 13 08:41:15.927714 kernel: ACPI: RSDT 0x00000000BFFE1B65 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 08:41:15.927728 kernel: ACPI: FACP 0x00000000BFFE1A49 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 08:41:15.927742 kernel: ACPI: DSDT 0x00000000BFFE0040 001A09 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 08:41:15.927755 kernel: ACPI: FACS 0x00000000BFFE0000 000040 May 13 08:41:15.927793 kernel: ACPI: APIC 0x00000000BFFE1ABD 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 13 08:41:15.927807 kernel: ACPI: WAET 0x00000000BFFE1B3D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 13 08:41:15.927821 kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1a49-0xbffe1abc] May 13 08:41:15.927838 kernel: ACPI: Reserving DSDT table memory at [mem 0xbffe0040-0xbffe1a48] May 13 08:41:15.927851 kernel: ACPI: Reserving FACS table memory at [mem 0xbffe0000-0xbffe003f] May 13 08:41:15.927865 kernel: ACPI: Reserving APIC table memory at [mem 0xbffe1abd-0xbffe1b3c] May 13 08:41:15.927878 kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1b3d-0xbffe1b64] May 13 08:41:15.927892 kernel: No NUMA configuration found May 13 08:41:15.927910 kernel: Faking a node at [mem 0x0000000000000000-0x000000013fffffff] May 13 08:41:15.927924 kernel: NODE_DATA(0) allocated [mem 0x13fff7000-0x13fffcfff] May 13 08:41:15.927940 kernel: Zone ranges: May 13 08:41:15.927955 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 13 08:41:15.927969 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 13 08:41:15.927983 kernel: Normal [mem 0x0000000100000000-0x000000013fffffff] May 13 08:41:15.927997 kernel: Movable zone start for each node May 13 08:41:15.928011 kernel: Early memory node ranges May 13 08:41:15.928025 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 13 08:41:15.928039 kernel: node 0: [mem 0x0000000000100000-0x00000000bffdcfff] May 13 08:41:15.928055 kernel: node 0: [mem 0x0000000100000000-0x000000013fffffff] May 13 08:41:15.928070 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000013fffffff] May 13 08:41:15.928083 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 13 08:41:15.928098 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 13 08:41:15.928112 kernel: On node 0, zone Normal: 35 pages in unavailable ranges May 13 08:41:15.928126 kernel: ACPI: PM-Timer IO Port: 0x608 May 13 08:41:15.928140 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 13 08:41:15.928154 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 13 08:41:15.928168 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 13 08:41:15.928185 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 13 08:41:15.928199 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 13 08:41:15.928213 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 13 08:41:15.928227 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 13 08:41:15.928241 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 13 08:41:15.928255 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 13 08:41:15.928269 kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices May 13 08:41:15.928283 kernel: Booting paravirtualized kernel on KVM May 13 08:41:15.928298 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 13 08:41:15.928314 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 13 08:41:15.928329 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 13 08:41:15.928343 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 13 08:41:15.928356 kernel: pcpu-alloc: [0] 0 1 May 13 08:41:15.928370 kernel: kvm-guest: stealtime: cpu 0, msr 13bc1c0c0 May 13 08:41:15.928384 kernel: kvm-guest: PV spinlocks disabled, no host support May 13 08:41:15.928398 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1031901 May 13 08:41:15.928412 kernel: Policy zone: Normal May 13 08:41:15.928429 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 08:41:15.928446 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 13 08:41:15.928460 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 13 08:41:15.928475 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 13 08:41:15.928489 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 13 08:41:15.928504 kernel: Memory: 3968276K/4193772K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 225236K reserved, 0K cma-reserved) May 13 08:41:15.928518 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 13 08:41:15.928532 kernel: ftrace: allocating 34584 entries in 136 pages May 13 08:41:15.928546 kernel: ftrace: allocated 136 pages with 2 groups May 13 08:41:15.928563 kernel: rcu: Hierarchical RCU implementation. May 13 08:41:15.928578 kernel: rcu: RCU event tracing is enabled. May 13 08:41:15.928592 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 13 08:41:15.928607 kernel: Rude variant of Tasks RCU enabled. May 13 08:41:15.928621 kernel: Tracing variant of Tasks RCU enabled. May 13 08:41:15.928635 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 13 08:41:15.928649 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 13 08:41:15.928663 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 13 08:41:15.928677 kernel: Console: colour VGA+ 80x25 May 13 08:41:15.928694 kernel: printk: console [tty0] enabled May 13 08:41:15.928708 kernel: printk: console [ttyS0] enabled May 13 08:41:15.928722 kernel: ACPI: Core revision 20210730 May 13 08:41:15.928754 kernel: APIC: Switch to symmetric I/O mode setup May 13 08:41:15.928785 kernel: x2apic enabled May 13 08:41:15.928800 kernel: Switched APIC routing to physical x2apic. May 13 08:41:15.928814 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 13 08:41:15.928828 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 13 08:41:15.928842 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) May 13 08:41:15.928859 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 May 13 08:41:15.928874 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 May 13 08:41:15.928888 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 13 08:41:15.928902 kernel: Spectre V2 : Mitigation: Retpolines May 13 08:41:15.928916 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 13 08:41:15.928930 kernel: Speculative Store Bypass: Vulnerable May 13 08:41:15.928944 kernel: x86/fpu: x87 FPU will use FXSAVE May 13 08:41:15.928958 kernel: Freeing SMP alternatives memory: 32K May 13 08:41:15.928972 kernel: pid_max: default: 32768 minimum: 301 May 13 08:41:15.928988 kernel: LSM: Security Framework initializing May 13 08:41:15.929002 kernel: SELinux: Initializing. May 13 08:41:15.929016 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 08:41:15.929031 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 13 08:41:15.929045 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) May 13 08:41:15.929060 kernel: Performance Events: AMD PMU driver. May 13 08:41:15.929083 kernel: ... version: 0 May 13 08:41:15.929099 kernel: ... bit width: 48 May 13 08:41:15.929114 kernel: ... generic registers: 4 May 13 08:41:15.929128 kernel: ... value mask: 0000ffffffffffff May 13 08:41:15.929143 kernel: ... max period: 00007fffffffffff May 13 08:41:15.929157 kernel: ... fixed-purpose events: 0 May 13 08:41:15.929174 kernel: ... event mask: 000000000000000f May 13 08:41:15.929189 kernel: signal: max sigframe size: 1440 May 13 08:41:15.929204 kernel: rcu: Hierarchical SRCU implementation. May 13 08:41:15.929219 kernel: smp: Bringing up secondary CPUs ... May 13 08:41:15.929233 kernel: x86: Booting SMP configuration: May 13 08:41:15.929250 kernel: .... node #0, CPUs: #1 May 13 08:41:15.929265 kernel: kvm-clock: cpu 1, msr 15196041, secondary cpu clock May 13 08:41:15.929279 kernel: kvm-guest: stealtime: cpu 1, msr 13bd1c0c0 May 13 08:41:15.929294 kernel: smp: Brought up 1 node, 2 CPUs May 13 08:41:15.929309 kernel: smpboot: Max logical packages: 2 May 13 08:41:15.929323 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) May 13 08:41:15.929338 kernel: devtmpfs: initialized May 13 08:41:15.929353 kernel: x86/mm: Memory block size: 128MB May 13 08:41:15.929368 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 13 08:41:15.929385 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 13 08:41:15.929400 kernel: pinctrl core: initialized pinctrl subsystem May 13 08:41:15.929414 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 13 08:41:15.929429 kernel: audit: initializing netlink subsys (disabled) May 13 08:41:15.929440 kernel: audit: type=2000 audit(1747125675.825:1): state=initialized audit_enabled=0 res=1 May 13 08:41:15.929449 kernel: thermal_sys: Registered thermal governor 'step_wise' May 13 08:41:15.929459 kernel: thermal_sys: Registered thermal governor 'user_space' May 13 08:41:15.929469 kernel: cpuidle: using governor menu May 13 08:41:15.929479 kernel: ACPI: bus type PCI registered May 13 08:41:15.929490 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 13 08:41:15.929498 kernel: dca service started, version 1.12.1 May 13 08:41:15.929506 kernel: PCI: Using configuration type 1 for base access May 13 08:41:15.929514 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 13 08:41:15.929522 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 13 08:41:15.929530 kernel: ACPI: Added _OSI(Module Device) May 13 08:41:15.929538 kernel: ACPI: Added _OSI(Processor Device) May 13 08:41:15.929545 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 13 08:41:15.929553 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 13 08:41:15.929562 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 13 08:41:15.929570 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 13 08:41:15.929578 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 13 08:41:15.929586 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 13 08:41:15.929594 kernel: ACPI: Interpreter enabled May 13 08:41:15.929601 kernel: ACPI: PM: (supports S0 S3 S5) May 13 08:41:15.929609 kernel: ACPI: Using IOAPIC for interrupt routing May 13 08:41:15.929618 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 13 08:41:15.929626 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 13 08:41:15.929635 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 13 08:41:15.929759 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 13 08:41:15.929862 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 13 08:41:15.929875 kernel: acpiphp: Slot [3] registered May 13 08:41:15.929883 kernel: acpiphp: Slot [4] registered May 13 08:41:15.929891 kernel: acpiphp: Slot [5] registered May 13 08:41:15.929899 kernel: acpiphp: Slot [6] registered May 13 08:41:15.929906 kernel: acpiphp: Slot [7] registered May 13 08:41:15.929918 kernel: acpiphp: Slot [8] registered May 13 08:41:15.929926 kernel: acpiphp: Slot [9] registered May 13 08:41:15.929934 kernel: acpiphp: Slot [10] registered May 13 08:41:15.929942 kernel: acpiphp: Slot [11] registered May 13 08:41:15.929949 kernel: acpiphp: Slot [12] registered May 13 08:41:15.929957 kernel: acpiphp: Slot [13] registered May 13 08:41:15.929965 kernel: acpiphp: Slot [14] registered May 13 08:41:15.929973 kernel: acpiphp: Slot [15] registered May 13 08:41:15.929981 kernel: acpiphp: Slot [16] registered May 13 08:41:15.929990 kernel: acpiphp: Slot [17] registered May 13 08:41:15.929998 kernel: acpiphp: Slot [18] registered May 13 08:41:15.930005 kernel: acpiphp: Slot [19] registered May 13 08:41:15.930013 kernel: acpiphp: Slot [20] registered May 13 08:41:15.930021 kernel: acpiphp: Slot [21] registered May 13 08:41:15.930029 kernel: acpiphp: Slot [22] registered May 13 08:41:15.930036 kernel: acpiphp: Slot [23] registered May 13 08:41:15.930044 kernel: acpiphp: Slot [24] registered May 13 08:41:15.930052 kernel: acpiphp: Slot [25] registered May 13 08:41:15.930060 kernel: acpiphp: Slot [26] registered May 13 08:41:15.930069 kernel: acpiphp: Slot [27] registered May 13 08:41:15.930077 kernel: acpiphp: Slot [28] registered May 13 08:41:15.930085 kernel: acpiphp: Slot [29] registered May 13 08:41:15.930093 kernel: acpiphp: Slot [30] registered May 13 08:41:15.930100 kernel: acpiphp: Slot [31] registered May 13 08:41:15.930108 kernel: PCI host bridge to bus 0000:00 May 13 08:41:15.930192 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 13 08:41:15.930266 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 13 08:41:15.930341 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 13 08:41:15.930412 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 13 08:41:15.930483 kernel: pci_bus 0000:00: root bus resource [mem 0xc000000000-0xc07fffffff window] May 13 08:41:15.930555 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 13 08:41:15.930648 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 13 08:41:15.930738 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 13 08:41:15.932884 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 May 13 08:41:15.932975 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] May 13 08:41:15.933061 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 13 08:41:15.933143 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 13 08:41:15.933227 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 13 08:41:15.933310 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 13 08:41:15.933400 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 May 13 08:41:15.933487 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI May 13 08:41:15.933569 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB May 13 08:41:15.933661 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 May 13 08:41:15.933745 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] May 13 08:41:15.933880 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xc000000000-0xc000003fff 64bit pref] May 13 08:41:15.933967 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] May 13 08:41:15.934049 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] May 13 08:41:15.934135 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 13 08:41:15.934227 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 May 13 08:41:15.934311 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] May 13 08:41:15.934393 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] May 13 08:41:15.934475 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xc000004000-0xc000007fff 64bit pref] May 13 08:41:15.934558 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] May 13 08:41:15.934645 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 May 13 08:41:15.934732 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] May 13 08:41:15.935698 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] May 13 08:41:15.935824 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xc000008000-0xc00000bfff 64bit pref] May 13 08:41:15.935917 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 May 13 08:41:15.935999 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] May 13 08:41:15.936081 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xc00000c000-0xc00000ffff 64bit pref] May 13 08:41:15.936172 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 May 13 08:41:15.936260 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] May 13 08:41:15.936341 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfeb93000-0xfeb93fff] May 13 08:41:15.936422 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xc000010000-0xc000013fff 64bit pref] May 13 08:41:15.936434 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 13 08:41:15.936442 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 13 08:41:15.936451 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 13 08:41:15.936459 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 13 08:41:15.936470 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 13 08:41:15.936478 kernel: iommu: Default domain type: Translated May 13 08:41:15.936486 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 13 08:41:15.936565 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device May 13 08:41:15.936646 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 13 08:41:15.936737 kernel: pci 0000:00:02.0: vgaarb: bridge control possible May 13 08:41:15.936749 kernel: vgaarb: loaded May 13 08:41:15.936757 kernel: pps_core: LinuxPPS API ver. 1 registered May 13 08:41:15.937812 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 13 08:41:15.937826 kernel: PTP clock support registered May 13 08:41:15.937834 kernel: PCI: Using ACPI for IRQ routing May 13 08:41:15.937842 kernel: PCI: pci_cache_line_size set to 64 bytes May 13 08:41:15.937850 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 13 08:41:15.937858 kernel: e820: reserve RAM buffer [mem 0xbffdd000-0xbfffffff] May 13 08:41:15.937866 kernel: clocksource: Switched to clocksource kvm-clock May 13 08:41:15.937874 kernel: VFS: Disk quotas dquot_6.6.0 May 13 08:41:15.937882 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 13 08:41:15.937890 kernel: pnp: PnP ACPI init May 13 08:41:15.937983 kernel: pnp 00:03: [dma 2] May 13 08:41:15.937996 kernel: pnp: PnP ACPI: found 5 devices May 13 08:41:15.938004 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 13 08:41:15.938012 kernel: NET: Registered PF_INET protocol family May 13 08:41:15.938021 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 13 08:41:15.938029 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 13 08:41:15.938037 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 13 08:41:15.938045 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 13 08:41:15.938055 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 13 08:41:15.938064 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 13 08:41:15.938072 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 08:41:15.938080 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 13 08:41:15.938087 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 13 08:41:15.938095 kernel: NET: Registered PF_XDP protocol family May 13 08:41:15.938169 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 13 08:41:15.938242 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 13 08:41:15.938313 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 13 08:41:15.938388 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] May 13 08:41:15.938459 kernel: pci_bus 0000:00: resource 8 [mem 0xc000000000-0xc07fffffff window] May 13 08:41:15.938541 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release May 13 08:41:15.938623 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 13 08:41:15.938705 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 13 08:41:15.938716 kernel: PCI: CLS 0 bytes, default 64 May 13 08:41:15.938724 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 13 08:41:15.938733 kernel: software IO TLB: mapped [mem 0x00000000bbfdd000-0x00000000bffdd000] (64MB) May 13 08:41:15.938744 kernel: Initialise system trusted keyrings May 13 08:41:15.938752 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 13 08:41:15.938774 kernel: Key type asymmetric registered May 13 08:41:15.939832 kernel: Asymmetric key parser 'x509' registered May 13 08:41:15.939842 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 13 08:41:15.939850 kernel: io scheduler mq-deadline registered May 13 08:41:15.939858 kernel: io scheduler kyber registered May 13 08:41:15.939866 kernel: io scheduler bfq registered May 13 08:41:15.939874 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 13 08:41:15.939885 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 May 13 08:41:15.939894 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 May 13 08:41:15.939902 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 13 08:41:15.939910 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 May 13 08:41:15.939918 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 13 08:41:15.939926 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 13 08:41:15.939934 kernel: random: crng init done May 13 08:41:15.939942 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 13 08:41:15.939950 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 13 08:41:15.939959 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 13 08:41:15.939968 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 13 08:41:15.940060 kernel: rtc_cmos 00:04: RTC can wake from S4 May 13 08:41:15.940137 kernel: rtc_cmos 00:04: registered as rtc0 May 13 08:41:15.940212 kernel: rtc_cmos 00:04: setting system clock to 2025-05-13T08:41:15 UTC (1747125675) May 13 08:41:15.940286 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram May 13 08:41:15.940298 kernel: NET: Registered PF_INET6 protocol family May 13 08:41:15.940306 kernel: Segment Routing with IPv6 May 13 08:41:15.940317 kernel: In-situ OAM (IOAM) with IPv6 May 13 08:41:15.940325 kernel: NET: Registered PF_PACKET protocol family May 13 08:41:15.940333 kernel: Key type dns_resolver registered May 13 08:41:15.940340 kernel: IPI shorthand broadcast: enabled May 13 08:41:15.940348 kernel: sched_clock: Marking stable (862101158, 161781969)->(1090199429, -66316302) May 13 08:41:15.940356 kernel: registered taskstats version 1 May 13 08:41:15.940364 kernel: Loading compiled-in X.509 certificates May 13 08:41:15.940372 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 52373c12592f53b0567bb941a0a0fec888191095' May 13 08:41:15.940380 kernel: Key type .fscrypt registered May 13 08:41:15.940389 kernel: Key type fscrypt-provisioning registered May 13 08:41:15.940398 kernel: ima: No TPM chip found, activating TPM-bypass! May 13 08:41:15.940406 kernel: ima: Allocated hash algorithm: sha1 May 13 08:41:15.940414 kernel: ima: No architecture policies found May 13 08:41:15.940421 kernel: clk: Disabling unused clocks May 13 08:41:15.940429 kernel: Freeing unused kernel image (initmem) memory: 47456K May 13 08:41:15.940438 kernel: Write protecting the kernel read-only data: 28672k May 13 08:41:15.940446 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 13 08:41:15.940454 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 13 08:41:15.940463 kernel: Run /init as init process May 13 08:41:15.940471 kernel: with arguments: May 13 08:41:15.940479 kernel: /init May 13 08:41:15.940487 kernel: with environment: May 13 08:41:15.940494 kernel: HOME=/ May 13 08:41:15.940502 kernel: TERM=linux May 13 08:41:15.940510 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 13 08:41:15.940521 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 08:41:15.940533 systemd[1]: Detected virtualization kvm. May 13 08:41:15.940542 systemd[1]: Detected architecture x86-64. May 13 08:41:15.940551 systemd[1]: Running in initrd. May 13 08:41:15.940559 systemd[1]: No hostname configured, using default hostname. May 13 08:41:15.940568 systemd[1]: Hostname set to . May 13 08:41:15.940577 systemd[1]: Initializing machine ID from VM UUID. May 13 08:41:15.940585 systemd[1]: Queued start job for default target initrd.target. May 13 08:41:15.940595 systemd[1]: Started systemd-ask-password-console.path. May 13 08:41:15.940604 systemd[1]: Reached target cryptsetup.target. May 13 08:41:15.940612 systemd[1]: Reached target paths.target. May 13 08:41:15.940620 systemd[1]: Reached target slices.target. May 13 08:41:15.940629 systemd[1]: Reached target swap.target. May 13 08:41:15.940637 systemd[1]: Reached target timers.target. May 13 08:41:15.940646 systemd[1]: Listening on iscsid.socket. May 13 08:41:15.940654 systemd[1]: Listening on iscsiuio.socket. May 13 08:41:15.940665 systemd[1]: Listening on systemd-journald-audit.socket. May 13 08:41:15.940680 systemd[1]: Listening on systemd-journald-dev-log.socket. May 13 08:41:15.940691 systemd[1]: Listening on systemd-journald.socket. May 13 08:41:15.940699 systemd[1]: Listening on systemd-networkd.socket. May 13 08:41:15.940708 systemd[1]: Listening on systemd-udevd-control.socket. May 13 08:41:15.940717 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 08:41:15.940738 systemd[1]: Reached target sockets.target. May 13 08:41:15.940747 systemd[1]: Starting kmod-static-nodes.service... May 13 08:41:15.940756 systemd[1]: Finished network-cleanup.service. May 13 08:41:15.944792 systemd[1]: Starting systemd-fsck-usr.service... May 13 08:41:15.944803 systemd[1]: Starting systemd-journald.service... May 13 08:41:15.944813 systemd[1]: Starting systemd-modules-load.service... May 13 08:41:15.944822 systemd[1]: Starting systemd-resolved.service... May 13 08:41:15.944831 systemd[1]: Starting systemd-vconsole-setup.service... May 13 08:41:15.944840 systemd[1]: Finished kmod-static-nodes.service. May 13 08:41:15.944852 systemd[1]: Finished systemd-fsck-usr.service. May 13 08:41:15.944864 systemd-journald[185]: Journal started May 13 08:41:15.944907 systemd-journald[185]: Runtime Journal (/run/log/journal/5683f28831a0464badbe2046fc4adb6b) is 8.0M, max 78.4M, 70.4M free. May 13 08:41:15.930794 systemd-modules-load[186]: Inserted module 'overlay' May 13 08:41:15.936084 systemd-resolved[187]: Positive Trust Anchors: May 13 08:41:15.960375 systemd[1]: Started systemd-resolved.service. May 13 08:41:15.960402 kernel: audit: type=1130 audit(1747125675.952:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:15.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:15.936095 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 08:41:15.936133 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 08:41:15.939957 systemd-resolved[187]: Defaulting to hostname 'linux'. May 13 08:41:15.972141 systemd[1]: Started systemd-journald.service. May 13 08:41:15.972171 kernel: audit: type=1130 audit(1747125675.963:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:15.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:15.971145 systemd[1]: Finished systemd-vconsole-setup.service. May 13 08:41:15.977939 kernel: audit: type=1130 audit(1747125675.966:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:15.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:15.971714 systemd[1]: Reached target nss-lookup.target. May 13 08:41:15.978525 systemd[1]: Starting dracut-cmdline-ask.service... May 13 08:41:15.989675 kernel: audit: type=1130 audit(1747125675.971:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:15.989692 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 13 08:41:15.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:15.987732 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 08:41:15.997413 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 08:41:16.004743 kernel: Bridge firewalling registered May 13 08:41:16.005222 kernel: audit: type=1130 audit(1747125675.997:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:15.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:15.998000 systemd-modules-load[186]: Inserted module 'br_netfilter' May 13 08:41:16.007074 systemd[1]: Finished dracut-cmdline-ask.service. May 13 08:41:16.008314 systemd[1]: Starting dracut-cmdline.service... May 13 08:41:16.014891 kernel: audit: type=1130 audit(1747125676.006:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:16.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:16.018913 dracut-cmdline[200]: dracut-dracut-053 May 13 08:41:16.020498 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=b36b4a233fdb797f33aa4a04cfdf4a35ceaebd893b04da45dfb96d44a18c6166 May 13 08:41:16.033783 kernel: SCSI subsystem initialized May 13 08:41:16.047858 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 13 08:41:16.047884 kernel: device-mapper: uevent: version 1.0.3 May 13 08:41:16.049935 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 13 08:41:16.053126 systemd-modules-load[186]: Inserted module 'dm_multipath' May 13 08:41:16.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:16.054589 systemd[1]: Finished systemd-modules-load.service. May 13 08:41:16.055824 systemd[1]: Starting systemd-sysctl.service... May 13 08:41:16.062027 kernel: audit: type=1130 audit(1747125676.054:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:16.063193 systemd[1]: Finished systemd-sysctl.service. May 13 08:41:16.070908 kernel: audit: type=1130 audit(1747125676.063:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:16.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:16.082792 kernel: Loading iSCSI transport class v2.0-870. May 13 08:41:16.104017 kernel: iscsi: registered transport (tcp) May 13 08:41:16.131274 kernel: iscsi: registered transport (qla4xxx) May 13 08:41:16.131342 kernel: QLogic iSCSI HBA Driver May 13 08:41:16.182185 systemd[1]: Finished dracut-cmdline.service. May 13 08:41:16.189910 kernel: audit: type=1130 audit(1747125676.182:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:16.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:16.185140 systemd[1]: Starting dracut-pre-udev.service... May 13 08:41:16.267877 kernel: raid6: sse2x4 gen() 9149 MB/s May 13 08:41:16.285865 kernel: raid6: sse2x4 xor() 7246 MB/s May 13 08:41:16.303868 kernel: raid6: sse2x2 gen() 14459 MB/s May 13 08:41:16.321868 kernel: raid6: sse2x2 xor() 8732 MB/s May 13 08:41:16.339842 kernel: raid6: sse2x1 gen() 11408 MB/s May 13 08:41:16.358297 kernel: raid6: sse2x1 xor() 7001 MB/s May 13 08:41:16.358355 kernel: raid6: using algorithm sse2x2 gen() 14459 MB/s May 13 08:41:16.358383 kernel: raid6: .... xor() 8732 MB/s, rmw enabled May 13 08:41:16.363222 kernel: raid6: using ssse3x2 recovery algorithm May 13 08:41:16.379276 kernel: xor: measuring software checksum speed May 13 08:41:16.379344 kernel: prefetch64-sse : 17125 MB/sec May 13 08:41:16.380464 kernel: generic_sse : 16667 MB/sec May 13 08:41:16.380504 kernel: xor: using function: prefetch64-sse (17125 MB/sec) May 13 08:41:16.494841 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 13 08:41:16.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:16.510863 systemd[1]: Finished dracut-pre-udev.service. May 13 08:41:16.512000 audit: BPF prog-id=7 op=LOAD May 13 08:41:16.512000 audit: BPF prog-id=8 op=LOAD May 13 08:41:16.513965 systemd[1]: Starting systemd-udevd.service... May 13 08:41:16.527017 systemd-udevd[385]: Using default interface naming scheme 'v252'. May 13 08:41:16.531518 systemd[1]: Started systemd-udevd.service. May 13 08:41:16.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:16.539756 systemd[1]: Starting dracut-pre-trigger.service... May 13 08:41:16.566562 dracut-pre-trigger[406]: rd.md=0: removing MD RAID activation May 13 08:41:16.622328 systemd[1]: Finished dracut-pre-trigger.service. May 13 08:41:16.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:16.624597 systemd[1]: Starting systemd-udev-trigger.service... May 13 08:41:16.675483 systemd[1]: Finished systemd-udev-trigger.service. May 13 08:41:16.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:16.747797 kernel: libata version 3.00 loaded. May 13 08:41:16.757152 kernel: virtio_blk virtio2: [vda] 20971520 512-byte logical blocks (10.7 GB/10.0 GiB) May 13 08:41:16.772941 kernel: ata_piix 0000:00:01.1: version 2.13 May 13 08:41:16.773060 kernel: scsi host0: ata_piix May 13 08:41:16.773170 kernel: scsi host1: ata_piix May 13 08:41:16.773274 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 May 13 08:41:16.773287 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 May 13 08:41:16.773298 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 13 08:41:16.773308 kernel: GPT:17805311 != 20971519 May 13 08:41:16.773318 kernel: GPT:Alternate GPT header not at the end of the disk. May 13 08:41:16.773328 kernel: GPT:17805311 != 20971519 May 13 08:41:16.773337 kernel: GPT: Use GNU Parted to correct GPT errors. May 13 08:41:16.773347 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 08:41:16.966799 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (439) May 13 08:41:16.986034 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 13 08:41:16.995231 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 13 08:41:17.001221 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 13 08:41:17.002251 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 13 08:41:17.011230 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 08:41:17.013422 systemd[1]: Starting disk-uuid.service... May 13 08:41:17.035975 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 08:41:17.037280 disk-uuid[471]: Primary Header is updated. May 13 08:41:17.037280 disk-uuid[471]: Secondary Entries is updated. May 13 08:41:17.037280 disk-uuid[471]: Secondary Header is updated. May 13 08:41:18.060820 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 13 08:41:18.061138 disk-uuid[472]: The operation has completed successfully. May 13 08:41:18.125294 systemd[1]: disk-uuid.service: Deactivated successfully. May 13 08:41:18.127195 systemd[1]: Finished disk-uuid.service. May 13 08:41:18.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:18.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:18.148520 systemd[1]: Starting verity-setup.service... May 13 08:41:18.185848 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" May 13 08:41:18.285158 systemd[1]: Found device dev-mapper-usr.device. May 13 08:41:18.289236 systemd[1]: Mounting sysusr-usr.mount... May 13 08:41:18.295225 systemd[1]: Finished verity-setup.service. May 13 08:41:18.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:18.431800 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 13 08:41:18.431998 systemd[1]: Mounted sysusr-usr.mount. May 13 08:41:18.433070 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 13 08:41:18.434587 systemd[1]: Starting ignition-setup.service... May 13 08:41:18.435865 systemd[1]: Starting parse-ip-for-networkd.service... May 13 08:41:18.454431 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 08:41:18.454481 kernel: BTRFS info (device vda6): using free space tree May 13 08:41:18.454501 kernel: BTRFS info (device vda6): has skinny extents May 13 08:41:18.472180 systemd[1]: mnt-oem.mount: Deactivated successfully. May 13 08:41:18.484429 systemd[1]: Finished ignition-setup.service. May 13 08:41:18.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:18.485801 systemd[1]: Starting ignition-fetch-offline.service... May 13 08:41:18.515246 systemd[1]: Finished parse-ip-for-networkd.service. May 13 08:41:18.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:18.515000 audit: BPF prog-id=9 op=LOAD May 13 08:41:18.517238 systemd[1]: Starting systemd-networkd.service... May 13 08:41:18.539021 systemd-networkd[642]: lo: Link UP May 13 08:41:18.539032 systemd-networkd[642]: lo: Gained carrier May 13 08:41:18.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:18.539656 systemd-networkd[642]: Enumeration completed May 13 08:41:18.539983 systemd[1]: Started systemd-networkd.service. May 13 08:41:18.540074 systemd-networkd[642]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 08:41:18.541362 systemd[1]: Reached target network.target. May 13 08:41:18.541869 systemd-networkd[642]: eth0: Link UP May 13 08:41:18.541873 systemd-networkd[642]: eth0: Gained carrier May 13 08:41:18.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:18.542583 systemd[1]: Starting iscsiuio.service... May 13 08:41:18.548143 systemd[1]: Started iscsiuio.service. May 13 08:41:18.549914 systemd[1]: Starting iscsid.service... May 13 08:41:18.553902 iscsid[647]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 13 08:41:18.553902 iscsid[647]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 13 08:41:18.553902 iscsid[647]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 13 08:41:18.553902 iscsid[647]: If using hardware iscsi like qla4xxx this message can be ignored. May 13 08:41:18.553902 iscsid[647]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 13 08:41:18.553902 iscsid[647]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 13 08:41:18.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:18.554564 systemd[1]: Started iscsid.service. May 13 08:41:18.556309 systemd[1]: Starting dracut-initqueue.service... May 13 08:41:18.565855 systemd-networkd[642]: eth0: DHCPv4 address 172.24.4.17/24, gateway 172.24.4.1 acquired from 172.24.4.1 May 13 08:41:18.569510 systemd[1]: Finished dracut-initqueue.service. May 13 08:41:18.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:18.570305 systemd[1]: Reached target remote-fs-pre.target. May 13 08:41:18.572186 systemd[1]: Reached target remote-cryptsetup.target. May 13 08:41:18.572736 systemd[1]: Reached target remote-fs.target. May 13 08:41:18.574538 systemd[1]: Starting dracut-pre-mount.service... May 13 08:41:18.582480 systemd[1]: Finished dracut-pre-mount.service. May 13 08:41:18.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:18.756243 ignition[598]: Ignition 2.14.0 May 13 08:41:18.756266 ignition[598]: Stage: fetch-offline May 13 08:41:18.756356 ignition[598]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 08:41:18.756395 ignition[598]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 08:41:18.758443 ignition[598]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 08:41:18.758627 ignition[598]: parsed url from cmdline: "" May 13 08:41:18.758635 ignition[598]: no config URL provided May 13 08:41:18.758647 ignition[598]: reading system config file "/usr/lib/ignition/user.ign" May 13 08:41:18.758664 ignition[598]: no config at "/usr/lib/ignition/user.ign" May 13 08:41:18.760706 systemd[1]: Finished ignition-fetch-offline.service. May 13 08:41:18.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:18.758673 ignition[598]: failed to fetch config: resource requires networking May 13 08:41:18.758890 ignition[598]: Ignition finished successfully May 13 08:41:18.763955 systemd[1]: Starting ignition-fetch.service... May 13 08:41:18.774340 ignition[665]: Ignition 2.14.0 May 13 08:41:18.775087 ignition[665]: Stage: fetch May 13 08:41:18.775690 ignition[665]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 08:41:18.776477 ignition[665]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 08:41:18.777527 ignition[665]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 08:41:18.778355 ignition[665]: parsed url from cmdline: "" May 13 08:41:18.778405 ignition[665]: no config URL provided May 13 08:41:18.778905 ignition[665]: reading system config file "/usr/lib/ignition/user.ign" May 13 08:41:18.779584 ignition[665]: no config at "/usr/lib/ignition/user.ign" May 13 08:41:18.785548 ignition[665]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... May 13 08:41:18.785613 ignition[665]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... May 13 08:41:18.789927 ignition[665]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 May 13 08:41:19.097023 ignition[665]: GET result: OK May 13 08:41:19.097300 ignition[665]: parsing config with SHA512: c79aef4a8d0a6fb13c0034e9ca52546480fc5a3f4c71326eb03909af0d4bd18452b659791e495c6b59431bc376e2b0a24c4a5fd6ec36d0c6f93cf1aa707a6a14 May 13 08:41:19.111386 unknown[665]: fetched base config from "system" May 13 08:41:19.111423 unknown[665]: fetched base config from "system" May 13 08:41:19.112178 ignition[665]: fetch: fetch complete May 13 08:41:19.111438 unknown[665]: fetched user config from "openstack" May 13 08:41:19.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:19.112191 ignition[665]: fetch: fetch passed May 13 08:41:19.114818 systemd[1]: Finished ignition-fetch.service. May 13 08:41:19.112271 ignition[665]: Ignition finished successfully May 13 08:41:19.117673 systemd[1]: Starting ignition-kargs.service... May 13 08:41:19.141749 ignition[671]: Ignition 2.14.0 May 13 08:41:19.141805 ignition[671]: Stage: kargs May 13 08:41:19.142035 ignition[671]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 08:41:19.142084 ignition[671]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 08:41:19.144296 ignition[671]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 08:41:19.146332 ignition[671]: kargs: kargs passed May 13 08:41:19.149064 systemd[1]: Finished ignition-kargs.service. May 13 08:41:19.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:19.146423 ignition[671]: Ignition finished successfully May 13 08:41:19.152760 systemd[1]: Starting ignition-disks.service... May 13 08:41:19.171032 ignition[677]: Ignition 2.14.0 May 13 08:41:19.171056 ignition[677]: Stage: disks May 13 08:41:19.171301 ignition[677]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 08:41:19.171343 ignition[677]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 08:41:19.173607 ignition[677]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 08:41:19.175589 ignition[677]: disks: disks passed May 13 08:41:19.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:19.177133 systemd[1]: Finished ignition-disks.service. May 13 08:41:19.175678 ignition[677]: Ignition finished successfully May 13 08:41:19.180149 systemd[1]: Reached target initrd-root-device.target. May 13 08:41:19.182266 systemd[1]: Reached target local-fs-pre.target. May 13 08:41:19.184607 systemd[1]: Reached target local-fs.target. May 13 08:41:19.186989 systemd[1]: Reached target sysinit.target. May 13 08:41:19.189341 systemd[1]: Reached target basic.target. May 13 08:41:19.193311 systemd[1]: Starting systemd-fsck-root.service... May 13 08:41:19.222825 systemd-fsck[684]: ROOT: clean, 619/1628000 files, 124060/1617920 blocks May 13 08:41:19.234331 systemd[1]: Finished systemd-fsck-root.service. May 13 08:41:19.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:19.237239 systemd[1]: Mounting sysroot.mount... May 13 08:41:19.257806 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 13 08:41:19.259365 systemd[1]: Mounted sysroot.mount. May 13 08:41:19.260685 systemd[1]: Reached target initrd-root-fs.target. May 13 08:41:19.265279 systemd[1]: Mounting sysroot-usr.mount... May 13 08:41:19.267295 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 13 08:41:19.268611 systemd[1]: Starting flatcar-openstack-hostname.service... May 13 08:41:19.274607 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 13 08:41:19.274671 systemd[1]: Reached target ignition-diskful.target. May 13 08:41:19.281176 systemd[1]: Mounted sysroot-usr.mount. May 13 08:41:19.286607 systemd[1]: Starting initrd-setup-root.service... May 13 08:41:19.296302 initrd-setup-root[695]: cut: /sysroot/etc/passwd: No such file or directory May 13 08:41:19.319185 initrd-setup-root[703]: cut: /sysroot/etc/group: No such file or directory May 13 08:41:19.324452 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 13 08:41:19.334602 initrd-setup-root[712]: cut: /sysroot/etc/shadow: No such file or directory May 13 08:41:19.339823 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (710) May 13 08:41:19.345127 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 08:41:19.345183 kernel: BTRFS info (device vda6): using free space tree May 13 08:41:19.345219 kernel: BTRFS info (device vda6): has skinny extents May 13 08:41:19.349085 initrd-setup-root[736]: cut: /sysroot/etc/gshadow: No such file or directory May 13 08:41:19.361539 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 13 08:41:19.441201 systemd[1]: Finished initrd-setup-root.service. May 13 08:41:19.444062 systemd[1]: Starting ignition-mount.service... May 13 08:41:19.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:19.455089 systemd[1]: Starting sysroot-boot.service... May 13 08:41:19.470515 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 13 08:41:19.470624 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 13 08:41:19.490879 ignition[759]: INFO : Ignition 2.14.0 May 13 08:41:19.490879 ignition[759]: INFO : Stage: mount May 13 08:41:19.492209 ignition[759]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 08:41:19.492209 ignition[759]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 08:41:19.494348 ignition[759]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 08:41:19.495155 ignition[759]: INFO : mount: mount passed May 13 08:41:19.496195 ignition[759]: INFO : Ignition finished successfully May 13 08:41:19.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:19.496029 systemd[1]: Finished ignition-mount.service. May 13 08:41:19.501657 systemd[1]: Finished sysroot-boot.service. May 13 08:41:19.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:19.516202 coreos-metadata[690]: May 13 08:41:19.516 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 May 13 08:41:19.534226 coreos-metadata[690]: May 13 08:41:19.534 INFO Fetch successful May 13 08:41:19.534839 coreos-metadata[690]: May 13 08:41:19.534 INFO wrote hostname ci-3510-3-7-n-84acbc7f80.novalocal to /sysroot/etc/hostname May 13 08:41:19.538515 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. May 13 08:41:19.538681 systemd[1]: Finished flatcar-openstack-hostname.service. May 13 08:41:19.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:19.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:19.541591 systemd[1]: Starting ignition-files.service... May 13 08:41:19.550627 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 13 08:41:19.560819 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (768) May 13 08:41:19.565162 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 13 08:41:19.565204 kernel: BTRFS info (device vda6): using free space tree May 13 08:41:19.565225 kernel: BTRFS info (device vda6): has skinny extents May 13 08:41:19.577895 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 13 08:41:19.598916 ignition[787]: INFO : Ignition 2.14.0 May 13 08:41:19.598916 ignition[787]: INFO : Stage: files May 13 08:41:19.600034 ignition[787]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 08:41:19.600034 ignition[787]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 08:41:19.601773 ignition[787]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 08:41:19.604984 ignition[787]: DEBUG : files: compiled without relabeling support, skipping May 13 08:41:19.606090 ignition[787]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 13 08:41:19.606941 ignition[787]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 13 08:41:19.611054 ignition[787]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 13 08:41:19.611902 ignition[787]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 13 08:41:19.613051 unknown[787]: wrote ssh authorized keys file for user: core May 13 08:41:19.613712 ignition[787]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 13 08:41:19.614438 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 13 08:41:19.615354 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 13 08:41:19.615354 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 13 08:41:19.615354 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 13 08:41:19.615354 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 08:41:19.619289 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 08:41:19.619289 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 08:41:19.619289 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 May 13 08:41:19.997384 systemd-networkd[642]: eth0: Gained IPv6LL May 13 08:41:20.363805 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK May 13 08:41:21.916391 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 13 08:41:21.916391 ignition[787]: INFO : files: op(7): [started] processing unit "coreos-metadata-sshkeys@.service" May 13 08:41:21.916391 ignition[787]: INFO : files: op(7): [finished] processing unit "coreos-metadata-sshkeys@.service" May 13 08:41:21.916391 ignition[787]: INFO : files: op(8): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 13 08:41:21.935071 ignition[787]: INFO : files: op(8): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 13 08:41:21.935071 ignition[787]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" May 13 08:41:21.935071 ignition[787]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" May 13 08:41:21.935071 ignition[787]: INFO : files: files passed May 13 08:41:21.935071 ignition[787]: INFO : Ignition finished successfully May 13 08:41:21.975171 kernel: kauditd_printk_skb: 27 callbacks suppressed May 13 08:41:21.975193 kernel: audit: type=1130 audit(1747125681.935:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:21.975207 kernel: audit: type=1130 audit(1747125681.958:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:21.975220 kernel: audit: type=1130 audit(1747125681.964:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:21.975232 kernel: audit: type=1131 audit(1747125681.964:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:21.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:21.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:21.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:21.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:21.927962 systemd[1]: Finished ignition-files.service. May 13 08:41:21.937410 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 13 08:41:21.953394 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 13 08:41:21.978447 initrd-setup-root-after-ignition[810]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 13 08:41:21.954060 systemd[1]: Starting ignition-quench.service... May 13 08:41:21.957142 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 13 08:41:21.959237 systemd[1]: ignition-quench.service: Deactivated successfully. May 13 08:41:21.959400 systemd[1]: Finished ignition-quench.service. May 13 08:41:21.965629 systemd[1]: Reached target ignition-complete.target. May 13 08:41:21.978003 systemd[1]: Starting initrd-parse-etc.service... May 13 08:41:22.003070 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 13 08:41:22.028833 kernel: audit: type=1130 audit(1747125682.002:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.028854 kernel: audit: type=1131 audit(1747125682.002:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.003158 systemd[1]: Finished initrd-parse-etc.service. May 13 08:41:22.003810 systemd[1]: Reached target initrd-fs.target. May 13 08:41:22.028594 systemd[1]: Reached target initrd.target. May 13 08:41:22.029866 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 13 08:41:22.031541 systemd[1]: Starting dracut-pre-pivot.service... May 13 08:41:22.045634 systemd[1]: Finished dracut-pre-pivot.service. May 13 08:41:22.051320 kernel: audit: type=1130 audit(1747125682.045:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.046850 systemd[1]: Starting initrd-cleanup.service... May 13 08:41:22.059661 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 13 08:41:22.059743 systemd[1]: Finished initrd-cleanup.service. May 13 08:41:22.070858 kernel: audit: type=1130 audit(1747125682.059:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.070882 kernel: audit: type=1131 audit(1747125682.060:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.061419 systemd[1]: Stopped target nss-lookup.target. May 13 08:41:22.070529 systemd[1]: Stopped target remote-cryptsetup.target. May 13 08:41:22.071080 systemd[1]: Stopped target timers.target. May 13 08:41:22.078066 kernel: audit: type=1131 audit(1747125682.072:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.071992 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 13 08:41:22.072046 systemd[1]: Stopped dracut-pre-pivot.service. May 13 08:41:22.072941 systemd[1]: Stopped target initrd.target. May 13 08:41:22.078481 systemd[1]: Stopped target basic.target. May 13 08:41:22.079433 systemd[1]: Stopped target ignition-complete.target. May 13 08:41:22.080362 systemd[1]: Stopped target ignition-diskful.target. May 13 08:41:22.081279 systemd[1]: Stopped target initrd-root-device.target. May 13 08:41:22.082223 systemd[1]: Stopped target remote-fs.target. May 13 08:41:22.083163 systemd[1]: Stopped target remote-fs-pre.target. May 13 08:41:22.084083 systemd[1]: Stopped target sysinit.target. May 13 08:41:22.085008 systemd[1]: Stopped target local-fs.target. May 13 08:41:22.085901 systemd[1]: Stopped target local-fs-pre.target. May 13 08:41:22.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.086787 systemd[1]: Stopped target swap.target. May 13 08:41:22.087635 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 13 08:41:22.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.087680 systemd[1]: Stopped dracut-pre-mount.service. May 13 08:41:22.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.088537 systemd[1]: Stopped target cryptsetup.target. May 13 08:41:22.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.089422 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 13 08:41:22.089458 systemd[1]: Stopped dracut-initqueue.service. May 13 08:41:22.090358 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 13 08:41:22.097883 iscsid[647]: iscsid shutting down. May 13 08:41:22.090394 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 13 08:41:22.091260 systemd[1]: ignition-files.service: Deactivated successfully. May 13 08:41:22.091295 systemd[1]: Stopped ignition-files.service. May 13 08:41:22.092872 systemd[1]: Stopping ignition-mount.service... May 13 08:41:22.093755 systemd[1]: Stopping iscsid.service... May 13 08:41:22.104534 systemd[1]: Stopping sysroot-boot.service... May 13 08:41:22.105675 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 13 08:41:22.106472 systemd[1]: Stopped systemd-udev-trigger.service. May 13 08:41:22.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.109519 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 13 08:41:22.109572 systemd[1]: Stopped dracut-pre-trigger.service. May 13 08:41:22.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.111096 systemd[1]: iscsid.service: Deactivated successfully. May 13 08:41:22.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.111182 systemd[1]: Stopped iscsid.service. May 13 08:41:22.111915 systemd[1]: Stopping iscsiuio.service... May 13 08:41:22.114010 ignition[825]: INFO : Ignition 2.14.0 May 13 08:41:22.114631 ignition[825]: INFO : Stage: umount May 13 08:41:22.115258 ignition[825]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 13 08:41:22.116210 ignition[825]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 13 08:41:22.115604 systemd[1]: iscsiuio.service: Deactivated successfully. May 13 08:41:22.115696 systemd[1]: Stopped iscsiuio.service. May 13 08:41:22.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.119154 ignition[825]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 13 08:41:22.120660 ignition[825]: INFO : umount: umount passed May 13 08:41:22.121226 ignition[825]: INFO : Ignition finished successfully May 13 08:41:22.122397 systemd[1]: ignition-mount.service: Deactivated successfully. May 13 08:41:22.122473 systemd[1]: Stopped ignition-mount.service. May 13 08:41:22.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.123521 systemd[1]: ignition-disks.service: Deactivated successfully. May 13 08:41:22.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.123558 systemd[1]: Stopped ignition-disks.service. May 13 08:41:22.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.124401 systemd[1]: ignition-kargs.service: Deactivated successfully. May 13 08:41:22.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.124435 systemd[1]: Stopped ignition-kargs.service. May 13 08:41:22.125368 systemd[1]: ignition-fetch.service: Deactivated successfully. May 13 08:41:22.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.125402 systemd[1]: Stopped ignition-fetch.service. May 13 08:41:22.126285 systemd[1]: Stopped target network.target. May 13 08:41:22.127218 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 13 08:41:22.127255 systemd[1]: Stopped ignition-fetch-offline.service. May 13 08:41:22.128242 systemd[1]: Stopped target paths.target. May 13 08:41:22.129173 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 13 08:41:22.132797 systemd[1]: Stopped systemd-ask-password-console.path. May 13 08:41:22.138288 systemd[1]: Stopped target slices.target. May 13 08:41:22.139049 systemd[1]: Stopped target sockets.target. May 13 08:41:22.140266 systemd[1]: iscsid.socket: Deactivated successfully. May 13 08:41:22.140299 systemd[1]: Closed iscsid.socket. May 13 08:41:22.141154 systemd[1]: iscsiuio.socket: Deactivated successfully. May 13 08:41:22.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.141183 systemd[1]: Closed iscsiuio.socket. May 13 08:41:22.142051 systemd[1]: ignition-setup.service: Deactivated successfully. May 13 08:41:22.142087 systemd[1]: Stopped ignition-setup.service. May 13 08:41:22.143098 systemd[1]: Stopping systemd-networkd.service... May 13 08:41:22.144184 systemd[1]: Stopping systemd-resolved.service... May 13 08:41:22.145959 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 13 08:41:22.146815 systemd-networkd[642]: eth0: DHCPv6 lease lost May 13 08:41:22.147726 systemd[1]: systemd-networkd.service: Deactivated successfully. May 13 08:41:22.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.147838 systemd[1]: Stopped systemd-networkd.service. May 13 08:41:22.149344 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 13 08:41:22.150000 audit: BPF prog-id=9 op=UNLOAD May 13 08:41:22.149375 systemd[1]: Closed systemd-networkd.socket. May 13 08:41:22.150503 systemd[1]: Stopping network-cleanup.service... May 13 08:41:22.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.152576 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 13 08:41:22.152617 systemd[1]: Stopped parse-ip-for-networkd.service. May 13 08:41:22.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.153550 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 13 08:41:22.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.153585 systemd[1]: Stopped systemd-sysctl.service. May 13 08:41:22.155591 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 13 08:41:22.155626 systemd[1]: Stopped systemd-modules-load.service. May 13 08:41:22.156612 systemd[1]: Stopping systemd-udevd.service... May 13 08:41:22.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.165000 audit: BPF prog-id=6 op=UNLOAD May 13 08:41:22.162792 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 13 08:41:22.163260 systemd[1]: systemd-resolved.service: Deactivated successfully. May 13 08:41:22.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.163337 systemd[1]: Stopped systemd-resolved.service. May 13 08:41:22.166376 systemd[1]: systemd-udevd.service: Deactivated successfully. May 13 08:41:22.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.166488 systemd[1]: Stopped systemd-udevd.service. May 13 08:41:22.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.168611 systemd[1]: network-cleanup.service: Deactivated successfully. May 13 08:41:22.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.168691 systemd[1]: Stopped network-cleanup.service. May 13 08:41:22.169285 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 13 08:41:22.169317 systemd[1]: Closed systemd-udevd-control.socket. May 13 08:41:22.170008 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 13 08:41:22.170036 systemd[1]: Closed systemd-udevd-kernel.socket. May 13 08:41:22.171037 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 13 08:41:22.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.171074 systemd[1]: Stopped dracut-pre-udev.service. May 13 08:41:22.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.171955 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 13 08:41:22.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.171989 systemd[1]: Stopped dracut-cmdline.service. May 13 08:41:22.172892 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 13 08:41:22.172928 systemd[1]: Stopped dracut-cmdline-ask.service. May 13 08:41:22.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.174330 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 13 08:41:22.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.180604 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 13 08:41:22.180666 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 13 08:41:22.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:22.181819 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 13 08:41:22.181857 systemd[1]: Stopped kmod-static-nodes.service. May 13 08:41:22.182529 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 13 08:41:22.182565 systemd[1]: Stopped systemd-vconsole-setup.service. May 13 08:41:22.184276 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 13 08:41:22.184750 systemd[1]: sysroot-boot.service: Deactivated successfully. May 13 08:41:22.184857 systemd[1]: Stopped sysroot-boot.service. May 13 08:41:22.185610 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 13 08:41:22.185677 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 13 08:41:22.186485 systemd[1]: Reached target initrd-switch-root.target. May 13 08:41:22.187301 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 13 08:41:22.187339 systemd[1]: Stopped initrd-setup-root.service. May 13 08:41:22.188989 systemd[1]: Starting initrd-switch-root.service... May 13 08:41:22.207873 systemd[1]: Switching root. May 13 08:41:22.231017 systemd-journald[185]: Journal stopped May 13 08:41:26.587559 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). May 13 08:41:26.587609 kernel: SELinux: Class mctp_socket not defined in policy. May 13 08:41:26.587625 kernel: SELinux: Class anon_inode not defined in policy. May 13 08:41:26.587637 kernel: SELinux: the above unknown classes and permissions will be allowed May 13 08:41:26.587647 kernel: SELinux: policy capability network_peer_controls=1 May 13 08:41:26.587658 kernel: SELinux: policy capability open_perms=1 May 13 08:41:26.587669 kernel: SELinux: policy capability extended_socket_class=1 May 13 08:41:26.587680 kernel: SELinux: policy capability always_check_network=0 May 13 08:41:26.587690 kernel: SELinux: policy capability cgroup_seclabel=1 May 13 08:41:26.587701 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 13 08:41:26.587714 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 13 08:41:26.587728 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 13 08:41:26.587739 systemd[1]: Successfully loaded SELinux policy in 95.225ms. May 13 08:41:26.587758 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.875ms. May 13 08:41:26.587822 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 13 08:41:26.587835 systemd[1]: Detected virtualization kvm. May 13 08:41:26.587847 systemd[1]: Detected architecture x86-64. May 13 08:41:26.587858 systemd[1]: Detected first boot. May 13 08:41:26.587870 systemd[1]: Hostname set to . May 13 08:41:26.587884 systemd[1]: Initializing machine ID from VM UUID. May 13 08:41:26.587896 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 13 08:41:26.587907 systemd[1]: Populated /etc with preset unit settings. May 13 08:41:26.587919 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 08:41:26.587934 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 08:41:26.587947 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 08:41:26.587960 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 13 08:41:26.587973 systemd[1]: Stopped initrd-switch-root.service. May 13 08:41:26.587985 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 13 08:41:26.587998 systemd[1]: Created slice system-addon\x2dconfig.slice. May 13 08:41:26.588010 systemd[1]: Created slice system-addon\x2drun.slice. May 13 08:41:26.588023 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 13 08:41:26.588035 systemd[1]: Created slice system-getty.slice. May 13 08:41:26.588046 systemd[1]: Created slice system-modprobe.slice. May 13 08:41:26.588057 systemd[1]: Created slice system-serial\x2dgetty.slice. May 13 08:41:26.588070 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 13 08:41:26.588082 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 13 08:41:26.588093 systemd[1]: Created slice user.slice. May 13 08:41:26.588104 systemd[1]: Started systemd-ask-password-console.path. May 13 08:41:26.588115 systemd[1]: Started systemd-ask-password-wall.path. May 13 08:41:26.588128 systemd[1]: Set up automount boot.automount. May 13 08:41:26.588140 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 13 08:41:26.588151 systemd[1]: Stopped target initrd-switch-root.target. May 13 08:41:26.588162 systemd[1]: Stopped target initrd-fs.target. May 13 08:41:26.588173 systemd[1]: Stopped target initrd-root-fs.target. May 13 08:41:26.588185 systemd[1]: Reached target integritysetup.target. May 13 08:41:26.588198 systemd[1]: Reached target remote-cryptsetup.target. May 13 08:41:26.588212 systemd[1]: Reached target remote-fs.target. May 13 08:41:26.588224 systemd[1]: Reached target slices.target. May 13 08:41:26.588235 systemd[1]: Reached target swap.target. May 13 08:41:26.588246 systemd[1]: Reached target torcx.target. May 13 08:41:26.588257 systemd[1]: Reached target veritysetup.target. May 13 08:41:26.588269 systemd[1]: Listening on systemd-coredump.socket. May 13 08:41:26.588280 systemd[1]: Listening on systemd-initctl.socket. May 13 08:41:26.588291 systemd[1]: Listening on systemd-networkd.socket. May 13 08:41:26.588304 systemd[1]: Listening on systemd-udevd-control.socket. May 13 08:41:26.588317 systemd[1]: Listening on systemd-udevd-kernel.socket. May 13 08:41:26.588328 systemd[1]: Listening on systemd-userdbd.socket. May 13 08:41:26.588339 systemd[1]: Mounting dev-hugepages.mount... May 13 08:41:26.588350 systemd[1]: Mounting dev-mqueue.mount... May 13 08:41:26.588361 systemd[1]: Mounting media.mount... May 13 08:41:26.588373 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 08:41:26.588384 systemd[1]: Mounting sys-kernel-debug.mount... May 13 08:41:26.588395 systemd[1]: Mounting sys-kernel-tracing.mount... May 13 08:41:26.588407 systemd[1]: Mounting tmp.mount... May 13 08:41:26.588420 systemd[1]: Starting flatcar-tmpfiles.service... May 13 08:41:26.588432 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 08:41:26.588444 systemd[1]: Starting kmod-static-nodes.service... May 13 08:41:26.588470 systemd[1]: Starting modprobe@configfs.service... May 13 08:41:26.588482 systemd[1]: Starting modprobe@dm_mod.service... May 13 08:41:26.588493 systemd[1]: Starting modprobe@drm.service... May 13 08:41:26.588505 systemd[1]: Starting modprobe@efi_pstore.service... May 13 08:41:26.588516 systemd[1]: Starting modprobe@fuse.service... May 13 08:41:26.588527 systemd[1]: Starting modprobe@loop.service... May 13 08:41:26.588541 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 13 08:41:26.588553 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 13 08:41:26.588564 systemd[1]: Stopped systemd-fsck-root.service. May 13 08:41:26.588577 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 13 08:41:26.588589 systemd[1]: Stopped systemd-fsck-usr.service. May 13 08:41:26.588600 systemd[1]: Stopped systemd-journald.service. May 13 08:41:26.588611 systemd[1]: Starting systemd-journald.service... May 13 08:41:26.588622 systemd[1]: Starting systemd-modules-load.service... May 13 08:41:26.588633 systemd[1]: Starting systemd-network-generator.service... May 13 08:41:26.588647 systemd[1]: Starting systemd-remount-fs.service... May 13 08:41:26.588658 systemd[1]: Starting systemd-udev-trigger.service... May 13 08:41:26.588670 systemd[1]: verity-setup.service: Deactivated successfully. May 13 08:41:26.588681 systemd[1]: Stopped verity-setup.service. May 13 08:41:26.588740 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 08:41:26.588754 systemd[1]: Mounted dev-hugepages.mount. May 13 08:41:26.588781 systemd[1]: Mounted dev-mqueue.mount. May 13 08:41:26.588793 systemd[1]: Mounted media.mount. May 13 08:41:26.588804 systemd[1]: Mounted sys-kernel-debug.mount. May 13 08:41:26.588818 systemd[1]: Mounted sys-kernel-tracing.mount. May 13 08:41:26.588830 systemd[1]: Mounted tmp.mount. May 13 08:41:26.588841 systemd[1]: Finished kmod-static-nodes.service. May 13 08:41:26.588853 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 08:41:26.588864 systemd[1]: Finished modprobe@dm_mod.service. May 13 08:41:26.588875 kernel: fuse: init (API version 7.34) May 13 08:41:26.588886 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 13 08:41:26.588898 systemd[1]: Finished modprobe@configfs.service. May 13 08:41:26.588913 systemd-journald[923]: Journal started May 13 08:41:26.588954 systemd-journald[923]: Runtime Journal (/run/log/journal/5683f28831a0464badbe2046fc4adb6b) is 8.0M, max 78.4M, 70.4M free. May 13 08:41:22.796000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 13 08:41:22.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 08:41:22.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 13 08:41:22.926000 audit: BPF prog-id=10 op=LOAD May 13 08:41:22.926000 audit: BPF prog-id=10 op=UNLOAD May 13 08:41:22.926000 audit: BPF prog-id=11 op=LOAD May 13 08:41:22.926000 audit: BPF prog-id=11 op=UNLOAD May 13 08:41:23.074000 audit[858]: AVC avc: denied { associate } for pid=858 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 13 08:41:23.074000 audit[858]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d892 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=841 pid=858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:41:23.074000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 08:41:23.077000 audit[858]: AVC avc: denied { associate } for pid=858 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 13 08:41:23.077000 audit[858]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d969 a2=1ed a3=0 items=2 ppid=841 pid=858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:41:23.077000 audit: CWD cwd="/" May 13 08:41:23.077000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:23.077000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:23.077000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 13 08:41:26.325000 audit: BPF prog-id=12 op=LOAD May 13 08:41:26.325000 audit: BPF prog-id=3 op=UNLOAD May 13 08:41:26.325000 audit: BPF prog-id=13 op=LOAD May 13 08:41:26.325000 audit: BPF prog-id=14 op=LOAD May 13 08:41:26.325000 audit: BPF prog-id=4 op=UNLOAD May 13 08:41:26.325000 audit: BPF prog-id=5 op=UNLOAD May 13 08:41:26.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.343000 audit: BPF prog-id=12 op=UNLOAD May 13 08:41:26.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.524000 audit: BPF prog-id=15 op=LOAD May 13 08:41:26.525000 audit: BPF prog-id=16 op=LOAD May 13 08:41:26.525000 audit: BPF prog-id=17 op=LOAD May 13 08:41:26.525000 audit: BPF prog-id=13 op=UNLOAD May 13 08:41:26.525000 audit: BPF prog-id=14 op=UNLOAD May 13 08:41:26.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.586000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 13 08:41:26.586000 audit[923]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffd7b8702f0 a2=4000 a3=7ffd7b87038c items=0 ppid=1 pid=923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:41:26.586000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 13 08:41:26.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:23.071108 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-13T08:41:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 08:41:26.323684 systemd[1]: Queued start job for default target multi-user.target. May 13 08:41:23.072016 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-13T08:41:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 08:41:26.323697 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 13 08:41:23.072042 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-13T08:41:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 08:41:26.327124 systemd[1]: systemd-journald.service: Deactivated successfully. May 13 08:41:26.591632 systemd[1]: Started systemd-journald.service. May 13 08:41:26.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:23.072075 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-13T08:41:23Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 13 08:41:23.072088 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-13T08:41:23Z" level=debug msg="skipped missing lower profile" missing profile=oem May 13 08:41:23.072121 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-13T08:41:23Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 13 08:41:26.591975 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 08:41:26.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:23.072136 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-13T08:41:23Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 13 08:41:26.592106 systemd[1]: Finished modprobe@drm.service. May 13 08:41:26.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.595822 kernel: loop: module loaded May 13 08:41:26.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:23.072336 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-13T08:41:23Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 13 08:41:26.593189 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 08:41:23.072379 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-13T08:41:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 13 08:41:26.593316 systemd[1]: Finished modprobe@efi_pstore.service. May 13 08:41:23.072395 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-13T08:41:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 13 08:41:26.594755 systemd[1]: Finished systemd-modules-load.service. May 13 08:41:26.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:23.074330 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-13T08:41:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 13 08:41:23.074367 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-13T08:41:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 13 08:41:23.074388 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-13T08:41:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 13 08:41:26.596555 systemd[1]: Finished systemd-network-generator.service. May 13 08:41:23.074405 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-13T08:41:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 13 08:41:23.074425 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-13T08:41:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 13 08:41:23.074441 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-13T08:41:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 13 08:41:26.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:25.885065 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-13T08:41:25Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 08:41:26.597388 systemd[1]: Finished systemd-remount-fs.service. May 13 08:41:25.885682 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-13T08:41:25Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 08:41:25.886113 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-13T08:41:25Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 08:41:26.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:25.887144 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-13T08:41:25Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 13 08:41:25.887307 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-13T08:41:25Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 13 08:41:25.887466 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-13T08:41:25Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 13 08:41:26.598223 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 13 08:41:26.598342 systemd[1]: Finished modprobe@fuse.service. May 13 08:41:26.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.600070 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 08:41:26.601023 systemd[1]: Finished modprobe@loop.service. May 13 08:41:26.601952 systemd[1]: Reached target network-pre.target. May 13 08:41:26.603791 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 13 08:41:26.607505 systemd[1]: Mounting sys-kernel-config.mount... May 13 08:41:26.610269 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 13 08:41:26.612204 systemd[1]: Starting systemd-hwdb-update.service... May 13 08:41:26.628605 systemd-journald[923]: Time spent on flushing to /var/log/journal/5683f28831a0464badbe2046fc4adb6b is 36.190ms for 1072 entries. May 13 08:41:26.628605 systemd-journald[923]: System Journal (/var/log/journal/5683f28831a0464badbe2046fc4adb6b) is 8.0M, max 584.8M, 576.8M free. May 13 08:41:26.685098 systemd-journald[923]: Received client request to flush runtime journal. May 13 08:41:26.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.613550 systemd[1]: Starting systemd-journal-flush.service... May 13 08:41:26.614063 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 08:41:26.614952 systemd[1]: Starting systemd-random-seed.service... May 13 08:41:26.615438 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 08:41:26.617308 systemd[1]: Starting systemd-sysctl.service... May 13 08:41:26.619958 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 13 08:41:26.620489 systemd[1]: Mounted sys-kernel-config.mount. May 13 08:41:26.644712 systemd[1]: Finished systemd-random-seed.service. May 13 08:41:26.645370 systemd[1]: Reached target first-boot-complete.target. May 13 08:41:26.654973 systemd[1]: Finished systemd-sysctl.service. May 13 08:41:26.680973 systemd[1]: Finished flatcar-tmpfiles.service. May 13 08:41:26.682538 systemd[1]: Starting systemd-sysusers.service... May 13 08:41:26.686069 systemd[1]: Finished systemd-journal-flush.service. May 13 08:41:26.701263 systemd[1]: Finished systemd-udev-trigger.service. May 13 08:41:26.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.702820 systemd[1]: Starting systemd-udev-settle.service... May 13 08:41:26.710815 udevadm[967]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 13 08:41:26.725646 systemd[1]: Finished systemd-sysusers.service. May 13 08:41:26.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:26.727141 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 13 08:41:26.767267 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 13 08:41:26.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:27.297359 systemd[1]: Finished systemd-hwdb-update.service. May 13 08:41:27.313867 kernel: kauditd_printk_skb: 96 callbacks suppressed May 13 08:41:27.313967 kernel: audit: type=1130 audit(1747125687.297:135): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:27.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:27.301000 audit: BPF prog-id=18 op=LOAD May 13 08:41:27.314434 systemd[1]: Starting systemd-udevd.service... May 13 08:41:27.318172 kernel: audit: type=1334 audit(1747125687.301:136): prog-id=18 op=LOAD May 13 08:41:27.318223 kernel: audit: type=1334 audit(1747125687.313:137): prog-id=19 op=LOAD May 13 08:41:27.318241 kernel: audit: type=1334 audit(1747125687.313:138): prog-id=7 op=UNLOAD May 13 08:41:27.318257 kernel: audit: type=1334 audit(1747125687.313:139): prog-id=8 op=UNLOAD May 13 08:41:27.313000 audit: BPF prog-id=19 op=LOAD May 13 08:41:27.313000 audit: BPF prog-id=7 op=UNLOAD May 13 08:41:27.313000 audit: BPF prog-id=8 op=UNLOAD May 13 08:41:27.343527 systemd-udevd[970]: Using default interface naming scheme 'v252'. May 13 08:41:27.381820 systemd[1]: Started systemd-udevd.service. May 13 08:41:27.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:27.387811 kernel: audit: type=1130 audit(1747125687.381:140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:27.390000 audit: BPF prog-id=20 op=LOAD May 13 08:41:27.392820 kernel: audit: type=1334 audit(1747125687.390:141): prog-id=20 op=LOAD May 13 08:41:27.393919 systemd[1]: Starting systemd-networkd.service... May 13 08:41:27.406000 audit: BPF prog-id=21 op=LOAD May 13 08:41:27.408032 systemd[1]: Starting systemd-userdbd.service... May 13 08:41:27.406000 audit: BPF prog-id=22 op=LOAD May 13 08:41:27.412191 kernel: audit: type=1334 audit(1747125687.406:142): prog-id=21 op=LOAD May 13 08:41:27.412242 kernel: audit: type=1334 audit(1747125687.406:143): prog-id=22 op=LOAD May 13 08:41:27.406000 audit: BPF prog-id=23 op=LOAD May 13 08:41:27.415322 kernel: audit: type=1334 audit(1747125687.406:144): prog-id=23 op=LOAD May 13 08:41:27.452908 systemd[1]: Started systemd-userdbd.service. May 13 08:41:27.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:27.480779 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 13 08:41:27.485182 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 13 08:41:27.500783 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 13 08:41:27.505000 audit[985]: AVC avc: denied { confidentiality } for pid=985 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 13 08:41:27.510780 kernel: ACPI: button: Power Button [PWRF] May 13 08:41:27.505000 audit[985]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5591006fb510 a1=338ac a2=7f8000b55bc5 a3=5 items=110 ppid=970 pid=985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:41:27.505000 audit: CWD cwd="/" May 13 08:41:27.505000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=1 name=(null) inode=13137 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=2 name=(null) inode=13137 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=3 name=(null) inode=13138 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=4 name=(null) inode=13137 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=5 name=(null) inode=13139 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=6 name=(null) inode=13137 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=7 name=(null) inode=13140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=8 name=(null) inode=13140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=9 name=(null) inode=13141 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=10 name=(null) inode=13140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=11 name=(null) inode=13142 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=12 name=(null) inode=13140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=13 name=(null) inode=13143 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=14 name=(null) inode=13140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=15 name=(null) inode=13144 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=16 name=(null) inode=13140 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=17 name=(null) inode=13145 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=18 name=(null) inode=13137 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=19 name=(null) inode=13146 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=20 name=(null) inode=13146 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=21 name=(null) inode=13147 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=22 name=(null) inode=13146 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=23 name=(null) inode=13148 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=24 name=(null) inode=13146 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=25 name=(null) inode=13149 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=26 name=(null) inode=13146 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=27 name=(null) inode=13150 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=28 name=(null) inode=13146 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=29 name=(null) inode=13151 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=30 name=(null) inode=13137 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=31 name=(null) inode=13152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=32 name=(null) inode=13152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=33 name=(null) inode=13153 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=34 name=(null) inode=13152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=35 name=(null) inode=13154 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=36 name=(null) inode=13152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=37 name=(null) inode=13155 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=38 name=(null) inode=13152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=39 name=(null) inode=13156 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=40 name=(null) inode=13152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=41 name=(null) inode=13157 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=42 name=(null) inode=13137 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=43 name=(null) inode=13158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=44 name=(null) inode=13158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=45 name=(null) inode=13159 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=46 name=(null) inode=13158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=47 name=(null) inode=13160 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=48 name=(null) inode=13158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=49 name=(null) inode=13161 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=50 name=(null) inode=13158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=51 name=(null) inode=13162 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=52 name=(null) inode=13158 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=53 name=(null) inode=13163 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=55 name=(null) inode=13164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=56 name=(null) inode=13164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=57 name=(null) inode=13165 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=58 name=(null) inode=13164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=59 name=(null) inode=13166 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=60 name=(null) inode=13164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=61 name=(null) inode=13167 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=62 name=(null) inode=13167 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=63 name=(null) inode=13168 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=64 name=(null) inode=13167 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=65 name=(null) inode=13169 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=66 name=(null) inode=13167 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=67 name=(null) inode=13170 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=68 name=(null) inode=13167 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=69 name=(null) inode=13171 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=70 name=(null) inode=13167 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=71 name=(null) inode=13172 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=72 name=(null) inode=13164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=73 name=(null) inode=13173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=74 name=(null) inode=13173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=75 name=(null) inode=13174 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=76 name=(null) inode=13173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=77 name=(null) inode=13175 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=78 name=(null) inode=13173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=79 name=(null) inode=13176 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=80 name=(null) inode=13173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=81 name=(null) inode=13177 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=82 name=(null) inode=13173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=83 name=(null) inode=13178 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=84 name=(null) inode=13164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=85 name=(null) inode=13179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=86 name=(null) inode=13179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=87 name=(null) inode=13180 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=88 name=(null) inode=13179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=89 name=(null) inode=13181 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=90 name=(null) inode=13179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=91 name=(null) inode=13182 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=92 name=(null) inode=13179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=93 name=(null) inode=13183 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=94 name=(null) inode=13179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=95 name=(null) inode=13184 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=96 name=(null) inode=13164 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=97 name=(null) inode=13185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=98 name=(null) inode=13185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=99 name=(null) inode=13186 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=100 name=(null) inode=13185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=101 name=(null) inode=13187 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=102 name=(null) inode=13185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=103 name=(null) inode=13188 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=104 name=(null) inode=13185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=105 name=(null) inode=13189 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=106 name=(null) inode=13185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=107 name=(null) inode=13190 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PATH item=109 name=(null) inode=14213 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:41:27.505000 audit: PROCTITLE proctitle="(udev-worker)" May 13 08:41:27.528800 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 May 13 08:41:27.544079 systemd-networkd[991]: lo: Link UP May 13 08:41:27.544091 systemd-networkd[991]: lo: Gained carrier May 13 08:41:27.545179 systemd-networkd[991]: Enumeration completed May 13 08:41:27.545274 systemd[1]: Started systemd-networkd.service. May 13 08:41:27.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:27.546198 systemd-networkd[991]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 13 08:41:27.547983 systemd-networkd[991]: eth0: Link UP May 13 08:41:27.547993 systemd-networkd[991]: eth0: Gained carrier May 13 08:41:27.557330 systemd-networkd[991]: eth0: DHCPv4 address 172.24.4.17/24, gateway 172.24.4.1 acquired from 172.24.4.1 May 13 08:41:27.561789 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 13 08:41:27.580865 kernel: mousedev: PS/2 mouse device common for all mice May 13 08:41:27.633126 systemd[1]: Finished systemd-udev-settle.service. May 13 08:41:27.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:27.634815 systemd[1]: Starting lvm2-activation-early.service... May 13 08:41:27.664676 lvm[1004]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 08:41:27.690372 systemd[1]: Finished lvm2-activation-early.service. May 13 08:41:27.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:27.691965 systemd[1]: Reached target cryptsetup.target. May 13 08:41:27.696039 systemd[1]: Starting lvm2-activation.service... May 13 08:41:27.703691 lvm[1005]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 13 08:41:27.740505 systemd[1]: Finished lvm2-activation.service. May 13 08:41:27.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:27.742046 systemd[1]: Reached target local-fs-pre.target. May 13 08:41:27.753564 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 13 08:41:27.753652 systemd[1]: Reached target local-fs.target. May 13 08:41:27.755334 systemd[1]: Reached target machines.target. May 13 08:41:27.758883 systemd[1]: Starting ldconfig.service... May 13 08:41:27.761389 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 08:41:27.761493 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 08:41:27.763991 systemd[1]: Starting systemd-boot-update.service... May 13 08:41:27.768484 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 13 08:41:27.780499 systemd[1]: Starting systemd-machine-id-commit.service... May 13 08:41:27.787152 systemd[1]: Starting systemd-sysext.service... May 13 08:41:27.791329 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1007 (bootctl) May 13 08:41:27.795823 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 13 08:41:27.811799 systemd[1]: Unmounting usr-share-oem.mount... May 13 08:41:27.821400 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 13 08:41:27.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:27.823048 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 13 08:41:27.823229 systemd[1]: Unmounted usr-share-oem.mount. May 13 08:41:27.845802 kernel: loop0: detected capacity change from 0 to 205544 May 13 08:41:27.888041 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 13 08:41:27.889182 systemd[1]: Finished systemd-machine-id-commit.service. May 13 08:41:27.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:27.930807 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 13 08:41:27.958838 kernel: loop1: detected capacity change from 0 to 205544 May 13 08:41:27.993748 (sd-sysext)[1019]: Using extensions 'kubernetes'. May 13 08:41:27.994103 (sd-sysext)[1019]: Merged extensions into '/usr'. May 13 08:41:28.029840 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 08:41:28.030692 systemd-fsck[1016]: fsck.fat 4.2 (2021-01-31) May 13 08:41:28.030692 systemd-fsck[1016]: /dev/vda1: 790 files, 120692/258078 clusters May 13 08:41:28.033541 systemd[1]: Mounting usr-share-oem.mount... May 13 08:41:28.038323 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 08:41:28.042515 systemd[1]: Starting modprobe@dm_mod.service... May 13 08:41:28.046074 systemd[1]: Starting modprobe@efi_pstore.service... May 13 08:41:28.047715 systemd[1]: Starting modprobe@loop.service... May 13 08:41:28.048598 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 08:41:28.048742 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 08:41:28.048972 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 08:41:28.052929 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 13 08:41:28.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.054113 systemd[1]: Mounted usr-share-oem.mount. May 13 08:41:28.055050 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 08:41:28.055191 systemd[1]: Finished modprobe@dm_mod.service. May 13 08:41:28.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.056036 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 08:41:28.056156 systemd[1]: Finished modprobe@efi_pstore.service. May 13 08:41:28.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.057055 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 08:41:28.057177 systemd[1]: Finished modprobe@loop.service. May 13 08:41:28.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.061613 systemd[1]: Mounting boot.mount... May 13 08:41:28.062385 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 08:41:28.062448 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 08:41:28.062821 systemd[1]: Finished systemd-sysext.service. May 13 08:41:28.066243 systemd[1]: Starting ensure-sysext.service... May 13 08:41:28.067881 systemd[1]: Starting systemd-tmpfiles-setup.service... May 13 08:41:28.074554 systemd[1]: Reloading. May 13 08:41:28.084972 systemd-tmpfiles[1027]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 13 08:41:28.088567 systemd-tmpfiles[1027]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 13 08:41:28.091089 systemd-tmpfiles[1027]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 13 08:41:28.164340 /usr/lib/systemd/system-generators/torcx-generator[1047]: time="2025-05-13T08:41:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 08:41:28.164905 /usr/lib/systemd/system-generators/torcx-generator[1047]: time="2025-05-13T08:41:28Z" level=info msg="torcx already run" May 13 08:41:28.271357 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 08:41:28.271379 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 08:41:28.296473 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 08:41:28.359000 audit: BPF prog-id=24 op=LOAD May 13 08:41:28.359000 audit: BPF prog-id=21 op=UNLOAD May 13 08:41:28.359000 audit: BPF prog-id=25 op=LOAD May 13 08:41:28.359000 audit: BPF prog-id=26 op=LOAD May 13 08:41:28.359000 audit: BPF prog-id=22 op=UNLOAD May 13 08:41:28.359000 audit: BPF prog-id=23 op=UNLOAD May 13 08:41:28.360000 audit: BPF prog-id=27 op=LOAD May 13 08:41:28.361000 audit: BPF prog-id=15 op=UNLOAD May 13 08:41:28.361000 audit: BPF prog-id=28 op=LOAD May 13 08:41:28.361000 audit: BPF prog-id=29 op=LOAD May 13 08:41:28.361000 audit: BPF prog-id=16 op=UNLOAD May 13 08:41:28.361000 audit: BPF prog-id=17 op=UNLOAD May 13 08:41:28.362000 audit: BPF prog-id=30 op=LOAD May 13 08:41:28.362000 audit: BPF prog-id=31 op=LOAD May 13 08:41:28.362000 audit: BPF prog-id=18 op=UNLOAD May 13 08:41:28.362000 audit: BPF prog-id=19 op=UNLOAD May 13 08:41:28.364000 audit: BPF prog-id=32 op=LOAD May 13 08:41:28.364000 audit: BPF prog-id=20 op=UNLOAD May 13 08:41:28.373264 systemd[1]: Mounted boot.mount. May 13 08:41:28.394501 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 08:41:28.395929 systemd[1]: Starting modprobe@dm_mod.service... May 13 08:41:28.397669 systemd[1]: Starting modprobe@efi_pstore.service... May 13 08:41:28.400026 systemd[1]: Starting modprobe@loop.service... May 13 08:41:28.400886 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 08:41:28.401022 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 08:41:28.402013 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 08:41:28.402182 systemd[1]: Finished modprobe@dm_mod.service. May 13 08:41:28.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.405286 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 08:41:28.408679 systemd[1]: Starting modprobe@dm_mod.service... May 13 08:41:28.409866 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 08:41:28.409988 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 08:41:28.410670 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 08:41:28.411032 systemd[1]: Finished modprobe@efi_pstore.service. May 13 08:41:28.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.412105 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 08:41:28.412286 systemd[1]: Finished modprobe@dm_mod.service. May 13 08:41:28.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.413529 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 08:41:28.417217 systemd[1]: modprobe@loop.service: Deactivated successfully. May 13 08:41:28.417592 systemd[1]: Finished modprobe@loop.service. May 13 08:41:28.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.420526 systemd[1]: Finished ensure-sysext.service. May 13 08:41:28.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.423273 systemd[1]: Finished systemd-boot-update.service. May 13 08:41:28.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.424315 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 13 08:41:28.425809 systemd[1]: Starting modprobe@dm_mod.service... May 13 08:41:28.427282 systemd[1]: Starting modprobe@drm.service... May 13 08:41:28.428849 systemd[1]: Starting modprobe@efi_pstore.service... May 13 08:41:28.429423 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 13 08:41:28.429474 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 08:41:28.431185 systemd[1]: Starting systemd-networkd-wait-online.service... May 13 08:41:28.432180 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 13 08:41:28.433100 systemd[1]: Finished modprobe@dm_mod.service. May 13 08:41:28.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.434531 systemd[1]: modprobe@drm.service: Deactivated successfully. May 13 08:41:28.434638 systemd[1]: Finished modprobe@drm.service. May 13 08:41:28.435400 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 13 08:41:28.435504 systemd[1]: Finished modprobe@efi_pstore.service. May 13 08:41:28.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.436729 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 13 08:41:28.436776 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 13 08:41:28.505962 ldconfig[1006]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 13 08:41:28.517226 systemd[1]: Finished systemd-tmpfiles-setup.service. May 13 08:41:28.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.519151 systemd[1]: Starting audit-rules.service... May 13 08:41:28.520476 systemd[1]: Starting clean-ca-certificates.service... May 13 08:41:28.522854 systemd[1]: Starting systemd-journal-catalog-update.service... May 13 08:41:28.524000 audit: BPF prog-id=33 op=LOAD May 13 08:41:28.526617 systemd[1]: Starting systemd-resolved.service... May 13 08:41:28.527000 audit: BPF prog-id=34 op=LOAD May 13 08:41:28.529452 systemd[1]: Starting systemd-timesyncd.service... May 13 08:41:28.532901 systemd[1]: Starting systemd-update-utmp.service... May 13 08:41:28.534033 systemd[1]: Finished ldconfig.service. May 13 08:41:28.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.534822 systemd[1]: Finished clean-ca-certificates.service. May 13 08:41:28.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.535534 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 13 08:41:28.544000 audit[1108]: SYSTEM_BOOT pid=1108 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 13 08:41:28.547458 systemd[1]: Finished systemd-update-utmp.service. May 13 08:41:28.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.568116 systemd[1]: Finished systemd-journal-catalog-update.service. May 13 08:41:28.569804 systemd[1]: Starting systemd-update-done.service... May 13 08:41:28.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.578458 systemd[1]: Finished systemd-update-done.service. May 13 08:41:28.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:28.605000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 13 08:41:28.605000 audit[1123]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffea12fc5c0 a2=420 a3=0 items=0 ppid=1102 pid=1123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:41:28.605000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 13 08:41:28.606683 augenrules[1123]: No rules May 13 08:41:28.607335 systemd[1]: Finished audit-rules.service. May 13 08:41:28.614495 systemd[1]: Started systemd-timesyncd.service. May 13 08:41:28.615094 systemd[1]: Reached target time-set.target. May 13 08:41:28.627670 systemd-resolved[1106]: Positive Trust Anchors: May 13 08:41:28.627991 systemd-resolved[1106]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 13 08:41:28.628083 systemd-resolved[1106]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 13 08:41:28.635868 systemd-resolved[1106]: Using system hostname 'ci-3510-3-7-n-84acbc7f80.novalocal'. May 13 08:41:28.637445 systemd[1]: Started systemd-resolved.service. May 13 08:41:28.637961 systemd[1]: Reached target network.target. May 13 08:41:28.638392 systemd[1]: Reached target nss-lookup.target. May 13 08:41:28.638855 systemd[1]: Reached target sysinit.target. May 13 08:41:28.639409 systemd[1]: Started motdgen.path. May 13 08:41:28.639867 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 13 08:41:28.640481 systemd[1]: Started logrotate.timer. May 13 08:41:28.641015 systemd[1]: Started mdadm.timer. May 13 08:41:28.641428 systemd[1]: Started systemd-tmpfiles-clean.timer. May 13 08:41:28.641888 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 13 08:41:28.641915 systemd[1]: Reached target paths.target. May 13 08:41:28.642331 systemd[1]: Reached target timers.target. May 13 08:41:28.643014 systemd[1]: Listening on dbus.socket. May 13 08:41:28.644362 systemd[1]: Starting docker.socket... May 13 08:41:28.647954 systemd[1]: Listening on sshd.socket. May 13 08:41:28.648563 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 08:41:28.648979 systemd[1]: Listening on docker.socket. May 13 08:41:28.649590 systemd[1]: Reached target sockets.target. May 13 08:41:28.650113 systemd[1]: Reached target basic.target. May 13 08:41:28.650648 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 08:41:28.650673 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 13 08:41:28.651643 systemd[1]: Starting containerd.service... May 13 08:41:28.653152 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 13 08:41:28.654649 systemd[1]: Starting dbus.service... May 13 08:41:28.657141 systemd[1]: Starting enable-oem-cloudinit.service... May 13 08:41:28.660077 systemd[1]: Starting extend-filesystems.service... May 13 08:41:28.660817 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 13 08:41:28.662268 systemd[1]: Starting motdgen.service... May 13 08:41:28.667100 systemd[1]: Starting ssh-key-proc-cmdline.service... May 13 08:41:28.669029 systemd[1]: Starting sshd-keygen.service... May 13 08:41:28.673700 jq[1135]: false May 13 08:41:28.675454 systemd[1]: Starting systemd-logind.service... May 13 08:41:28.679258 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 13 08:41:28.679323 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 13 08:41:28.679852 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 13 08:41:28.680591 systemd[1]: Starting update-engine.service... May 13 08:41:28.682286 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 13 08:41:28.687668 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 13 08:41:28.687877 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 13 08:41:28.698835 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 13 08:41:28.698991 systemd[1]: Finished ssh-key-proc-cmdline.service. May 13 08:41:28.708741 jq[1145]: true May 13 08:41:28.722314 systemd[1]: motdgen.service: Deactivated successfully. May 13 08:41:28.722490 systemd[1]: Finished motdgen.service. May 13 08:41:28.727671 jq[1158]: true May 13 08:41:28.742002 extend-filesystems[1137]: Found loop1 May 13 08:41:28.744148 extend-filesystems[1137]: Found vda May 13 08:41:28.744942 extend-filesystems[1137]: Found vda1 May 13 08:41:28.745445 extend-filesystems[1137]: Found vda2 May 13 08:41:28.745445 extend-filesystems[1137]: Found vda3 May 13 08:41:28.745445 extend-filesystems[1137]: Found usr May 13 08:41:28.745445 extend-filesystems[1137]: Found vda4 May 13 08:41:28.745445 extend-filesystems[1137]: Found vda6 May 13 08:41:28.745445 extend-filesystems[1137]: Found vda7 May 13 08:41:28.745445 extend-filesystems[1137]: Found vda9 May 13 08:41:28.745445 extend-filesystems[1137]: Checking size of /dev/vda9 May 13 08:41:28.754161 systemd[1]: Started dbus.service. May 13 08:41:28.753963 dbus-daemon[1133]: [system] SELinux support is enabled May 13 08:41:28.762132 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 13 08:41:28.762162 systemd[1]: Reached target system-config.target. May 13 08:41:28.762785 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 13 08:41:28.762812 systemd[1]: Reached target user-config.target. May 13 08:41:28.781155 extend-filesystems[1137]: Resized partition /dev/vda9 May 13 08:41:28.786694 extend-filesystems[1183]: resize2fs 1.46.5 (30-Dec-2021) May 13 08:41:28.806253 env[1147]: time="2025-05-13T08:41:28.806205334Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 13 08:41:28.812904 bash[1178]: Updated "/home/core/.ssh/authorized_keys" May 13 08:41:28.813032 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 13 08:41:28.816781 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 2014203 blocks May 13 08:41:28.819834 kernel: EXT4-fs (vda9): resized filesystem to 2014203 May 13 08:41:28.823730 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 08:41:28.823746 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 13 08:41:28.852279 systemd-logind[1141]: Watching system buttons on /dev/input/event1 (Power Button) May 13 08:41:28.852300 systemd-logind[1141]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 13 08:41:28.853867 systemd-logind[1141]: New seat seat0. May 13 08:41:28.854836 extend-filesystems[1183]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 13 08:41:28.854836 extend-filesystems[1183]: old_desc_blocks = 1, new_desc_blocks = 1 May 13 08:41:28.854836 extend-filesystems[1183]: The filesystem on /dev/vda9 is now 2014203 (4k) blocks long. May 13 08:41:28.855460 systemd[1]: extend-filesystems.service: Deactivated successfully. May 13 08:41:28.866192 update_engine[1144]: I0513 08:41:28.858081 1144 main.cc:92] Flatcar Update Engine starting May 13 08:41:28.866192 update_engine[1144]: I0513 08:41:28.864851 1144 update_check_scheduler.cc:74] Next update check in 10m22s May 13 08:41:28.866381 extend-filesystems[1137]: Resized filesystem in /dev/vda9 May 13 08:41:28.855599 systemd[1]: Finished extend-filesystems.service. May 13 08:41:28.861289 systemd[1]: Started systemd-logind.service. May 13 08:41:28.864656 systemd[1]: Started update-engine.service. May 13 08:41:28.868556 systemd[1]: Started locksmithd.service. May 13 08:41:30.022683 systemd-resolved[1106]: Clock change detected. Flushing caches. May 13 08:41:30.022828 systemd-timesyncd[1107]: Contacted time server 208.67.72.50:123 (0.flatcar.pool.ntp.org). May 13 08:41:30.023016 systemd-timesyncd[1107]: Initial clock synchronization to Tue 2025-05-13 08:41:30.022350 UTC. May 13 08:41:30.024279 env[1147]: time="2025-05-13T08:41:30.024239574Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 13 08:41:30.024405 env[1147]: time="2025-05-13T08:41:30.024381551Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 13 08:41:30.026395 env[1147]: time="2025-05-13T08:41:30.026358899Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 13 08:41:30.026395 env[1147]: time="2025-05-13T08:41:30.026391661Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 13 08:41:30.026649 env[1147]: time="2025-05-13T08:41:30.026619829Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 08:41:30.026691 env[1147]: time="2025-05-13T08:41:30.026646378Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 13 08:41:30.026691 env[1147]: time="2025-05-13T08:41:30.026661918Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 13 08:41:30.026691 env[1147]: time="2025-05-13T08:41:30.026674321Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 13 08:41:30.026801 env[1147]: time="2025-05-13T08:41:30.026770121Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 13 08:41:30.027152 env[1147]: time="2025-05-13T08:41:30.027032733Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 13 08:41:30.027199 env[1147]: time="2025-05-13T08:41:30.027175080Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 13 08:41:30.027229 env[1147]: time="2025-05-13T08:41:30.027196059Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 13 08:41:30.027775 env[1147]: time="2025-05-13T08:41:30.027247546Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 13 08:41:30.027775 env[1147]: time="2025-05-13T08:41:30.027268255Z" level=info msg="metadata content store policy set" policy=shared May 13 08:41:30.034208 env[1147]: time="2025-05-13T08:41:30.034174507Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 13 08:41:30.034250 env[1147]: time="2025-05-13T08:41:30.034216256Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 13 08:41:30.034250 env[1147]: time="2025-05-13T08:41:30.034233598Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 13 08:41:30.034304 env[1147]: time="2025-05-13T08:41:30.034282891Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 13 08:41:30.034329 env[1147]: time="2025-05-13T08:41:30.034304601Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 13 08:41:30.034383 env[1147]: time="2025-05-13T08:41:30.034323186Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 13 08:41:30.034417 env[1147]: time="2025-05-13T08:41:30.034385022Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 13 08:41:30.034417 env[1147]: time="2025-05-13T08:41:30.034403457Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 13 08:41:30.034466 env[1147]: time="2025-05-13T08:41:30.034419226Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 13 08:41:30.034466 env[1147]: time="2025-05-13T08:41:30.034435787Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 13 08:41:30.034466 env[1147]: time="2025-05-13T08:41:30.034452068Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 13 08:41:30.034535 env[1147]: time="2025-05-13T08:41:30.034468419Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 13 08:41:30.034590 env[1147]: time="2025-05-13T08:41:30.034568346Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 13 08:41:30.034694 env[1147]: time="2025-05-13T08:41:30.034672231Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 13 08:41:30.035055 env[1147]: time="2025-05-13T08:41:30.035033068Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 13 08:41:30.035090 env[1147]: time="2025-05-13T08:41:30.035066180Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 13 08:41:30.035090 env[1147]: time="2025-05-13T08:41:30.035083071Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 13 08:41:30.035173 env[1147]: time="2025-05-13T08:41:30.035153854Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 13 08:41:30.035211 env[1147]: time="2025-05-13T08:41:30.035175675Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 13 08:41:30.035258 env[1147]: time="2025-05-13T08:41:30.035191284Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 13 08:41:30.035292 env[1147]: time="2025-05-13T08:41:30.035260434Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 13 08:41:30.035292 env[1147]: time="2025-05-13T08:41:30.035276835Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 13 08:41:30.035342 env[1147]: time="2025-05-13T08:41:30.035291572Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 13 08:41:30.035342 env[1147]: time="2025-05-13T08:41:30.035305278Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 13 08:41:30.035342 env[1147]: time="2025-05-13T08:41:30.035319134Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 13 08:41:30.035342 env[1147]: time="2025-05-13T08:41:30.035335836Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 13 08:41:30.035485 env[1147]: time="2025-05-13T08:41:30.035462994Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 13 08:41:30.035523 env[1147]: time="2025-05-13T08:41:30.035487991Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 13 08:41:30.035523 env[1147]: time="2025-05-13T08:41:30.035502849Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 13 08:41:30.035523 env[1147]: time="2025-05-13T08:41:30.035517276Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 13 08:41:30.035595 env[1147]: time="2025-05-13T08:41:30.035534338Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 13 08:41:30.035595 env[1147]: time="2025-05-13T08:41:30.035547222Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 13 08:41:30.035595 env[1147]: time="2025-05-13T08:41:30.035567941Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 13 08:41:30.035664 env[1147]: time="2025-05-13T08:41:30.035605000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 13 08:41:30.035881 env[1147]: time="2025-05-13T08:41:30.035817218Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 13 08:41:30.039178 env[1147]: time="2025-05-13T08:41:30.035889454Z" level=info msg="Connect containerd service" May 13 08:41:30.039178 env[1147]: time="2025-05-13T08:41:30.035919530Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 13 08:41:30.039178 env[1147]: time="2025-05-13T08:41:30.036517792Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 08:41:30.039178 env[1147]: time="2025-05-13T08:41:30.036731713Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 13 08:41:30.039178 env[1147]: time="2025-05-13T08:41:30.036769775Z" level=info msg=serving... address=/run/containerd/containerd.sock May 13 08:41:30.039178 env[1147]: time="2025-05-13T08:41:30.037617996Z" level=info msg="containerd successfully booted in 0.084741s" May 13 08:41:30.039178 env[1147]: time="2025-05-13T08:41:30.038234662Z" level=info msg="Start subscribing containerd event" May 13 08:41:30.039178 env[1147]: time="2025-05-13T08:41:30.038273876Z" level=info msg="Start recovering state" May 13 08:41:30.039178 env[1147]: time="2025-05-13T08:41:30.038330071Z" level=info msg="Start event monitor" May 13 08:41:30.039178 env[1147]: time="2025-05-13T08:41:30.038349918Z" level=info msg="Start snapshots syncer" May 13 08:41:30.039178 env[1147]: time="2025-05-13T08:41:30.038361731Z" level=info msg="Start cni network conf syncer for default" May 13 08:41:30.039178 env[1147]: time="2025-05-13T08:41:30.038370377Z" level=info msg="Start streaming server" May 13 08:41:30.036872 systemd[1]: Started containerd.service. May 13 08:41:30.155998 locksmithd[1188]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 13 08:41:30.424381 systemd-networkd[991]: eth0: Gained IPv6LL May 13 08:41:30.426174 systemd[1]: Finished systemd-networkd-wait-online.service. May 13 08:41:30.426995 systemd[1]: Reached target network-online.target. May 13 08:41:30.429371 systemd[1]: Starting kubelet.service... May 13 08:41:30.595461 sshd_keygen[1159]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 13 08:41:30.621018 systemd[1]: Finished sshd-keygen.service. May 13 08:41:30.623217 systemd[1]: Starting issuegen.service... May 13 08:41:30.630422 systemd[1]: issuegen.service: Deactivated successfully. May 13 08:41:30.630641 systemd[1]: Finished issuegen.service. May 13 08:41:30.632851 systemd[1]: Starting systemd-user-sessions.service... May 13 08:41:30.640537 systemd[1]: Finished systemd-user-sessions.service. May 13 08:41:30.642629 systemd[1]: Started getty@tty1.service. May 13 08:41:30.644400 systemd[1]: Started serial-getty@ttyS0.service. May 13 08:41:30.645266 systemd[1]: Reached target getty.target. May 13 08:41:31.986598 systemd[1]: Started kubelet.service. May 13 08:41:32.804277 systemd[1]: Created slice system-sshd.slice. May 13 08:41:32.808570 systemd[1]: Started sshd@0-172.24.4.17:22-172.24.4.1:55958.service. May 13 08:41:33.277725 kubelet[1213]: E0513 08:41:33.277595 1213 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 08:41:33.281078 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 08:41:33.281351 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 08:41:33.281738 systemd[1]: kubelet.service: Consumed 1.899s CPU time. May 13 08:41:33.816731 sshd[1220]: Accepted publickey for core from 172.24.4.1 port 55958 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:41:33.821099 sshd[1220]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:41:33.846785 systemd[1]: Created slice user-500.slice. May 13 08:41:33.850515 systemd[1]: Starting user-runtime-dir@500.service... May 13 08:41:33.860324 systemd-logind[1141]: New session 1 of user core. May 13 08:41:33.873638 systemd[1]: Finished user-runtime-dir@500.service. May 13 08:41:33.878451 systemd[1]: Starting user@500.service... May 13 08:41:33.887101 (systemd)[1224]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 13 08:41:34.012391 systemd[1224]: Queued start job for default target default.target. May 13 08:41:34.012863 systemd[1224]: Reached target paths.target. May 13 08:41:34.012883 systemd[1224]: Reached target sockets.target. May 13 08:41:34.012897 systemd[1224]: Reached target timers.target. May 13 08:41:34.012924 systemd[1224]: Reached target basic.target. May 13 08:41:34.012962 systemd[1224]: Reached target default.target. May 13 08:41:34.012987 systemd[1224]: Startup finished in 113ms. May 13 08:41:34.013876 systemd[1]: Started user@500.service. May 13 08:41:34.022250 systemd[1]: Started session-1.scope. May 13 08:41:34.503482 systemd[1]: Started sshd@1-172.24.4.17:22-172.24.4.1:41320.service. May 13 08:41:36.091937 sshd[1233]: Accepted publickey for core from 172.24.4.1 port 41320 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:41:36.095217 sshd[1233]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:41:36.105829 systemd[1]: Started session-2.scope. May 13 08:41:36.108467 systemd-logind[1141]: New session 2 of user core. May 13 08:41:36.736447 sshd[1233]: pam_unix(sshd:session): session closed for user core May 13 08:41:36.741688 systemd[1]: Started sshd@2-172.24.4.17:22-172.24.4.1:41332.service. May 13 08:41:36.746785 systemd[1]: sshd@1-172.24.4.17:22-172.24.4.1:41320.service: Deactivated successfully. May 13 08:41:36.748544 systemd[1]: session-2.scope: Deactivated successfully. May 13 08:41:36.751593 systemd-logind[1141]: Session 2 logged out. Waiting for processes to exit. May 13 08:41:36.753969 systemd-logind[1141]: Removed session 2. May 13 08:41:36.907920 coreos-metadata[1132]: May 13 08:41:36.907 WARN failed to locate config-drive, using the metadata service API instead May 13 08:41:36.993308 coreos-metadata[1132]: May 13 08:41:36.993 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 May 13 08:41:37.280457 coreos-metadata[1132]: May 13 08:41:37.280 INFO Fetch successful May 13 08:41:37.280747 coreos-metadata[1132]: May 13 08:41:37.280 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 May 13 08:41:37.296467 coreos-metadata[1132]: May 13 08:41:37.296 INFO Fetch successful May 13 08:41:37.302633 unknown[1132]: wrote ssh authorized keys file for user: core May 13 08:41:37.330232 update-ssh-keys[1243]: Updated "/home/core/.ssh/authorized_keys" May 13 08:41:37.331582 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 13 08:41:37.332387 systemd[1]: Reached target multi-user.target. May 13 08:41:37.334792 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 13 08:41:37.350194 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 13 08:41:37.350515 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 13 08:41:37.351584 systemd[1]: Startup finished in 1.019s (kernel) + 7.006s (initrd) + 13.529s (userspace) = 21.555s. May 13 08:41:37.880850 sshd[1238]: Accepted publickey for core from 172.24.4.1 port 41332 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:41:37.883728 sshd[1238]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:41:37.894516 systemd-logind[1141]: New session 3 of user core. May 13 08:41:37.895577 systemd[1]: Started session-3.scope. May 13 08:41:38.522830 sshd[1238]: pam_unix(sshd:session): session closed for user core May 13 08:41:38.528065 systemd-logind[1141]: Session 3 logged out. Waiting for processes to exit. May 13 08:41:38.528613 systemd[1]: sshd@2-172.24.4.17:22-172.24.4.1:41332.service: Deactivated successfully. May 13 08:41:38.529957 systemd[1]: session-3.scope: Deactivated successfully. May 13 08:41:38.531802 systemd-logind[1141]: Removed session 3. May 13 08:41:43.533027 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 13 08:41:43.533522 systemd[1]: Stopped kubelet.service. May 13 08:41:43.533598 systemd[1]: kubelet.service: Consumed 1.899s CPU time. May 13 08:41:43.536217 systemd[1]: Starting kubelet.service... May 13 08:41:43.756211 systemd[1]: Started kubelet.service. May 13 08:41:43.868951 kubelet[1252]: E0513 08:41:43.868378 1252 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 08:41:43.875076 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 08:41:43.875416 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 08:41:48.534286 systemd[1]: Started sshd@3-172.24.4.17:22-172.24.4.1:57862.service. May 13 08:41:49.724391 sshd[1258]: Accepted publickey for core from 172.24.4.1 port 57862 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:41:49.727511 sshd[1258]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:41:49.737190 systemd-logind[1141]: New session 4 of user core. May 13 08:41:49.737952 systemd[1]: Started session-4.scope. May 13 08:41:50.368040 sshd[1258]: pam_unix(sshd:session): session closed for user core May 13 08:41:50.375369 systemd[1]: Started sshd@4-172.24.4.17:22-172.24.4.1:57864.service. May 13 08:41:50.376567 systemd[1]: sshd@3-172.24.4.17:22-172.24.4.1:57862.service: Deactivated successfully. May 13 08:41:50.377985 systemd[1]: session-4.scope: Deactivated successfully. May 13 08:41:50.381774 systemd-logind[1141]: Session 4 logged out. Waiting for processes to exit. May 13 08:41:50.384469 systemd-logind[1141]: Removed session 4. May 13 08:41:51.571002 sshd[1263]: Accepted publickey for core from 172.24.4.1 port 57864 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:41:51.573514 sshd[1263]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:41:51.583567 systemd-logind[1141]: New session 5 of user core. May 13 08:41:51.584391 systemd[1]: Started session-5.scope. May 13 08:41:52.213743 sshd[1263]: pam_unix(sshd:session): session closed for user core May 13 08:41:52.220517 systemd[1]: Started sshd@5-172.24.4.17:22-172.24.4.1:57866.service. May 13 08:41:52.221686 systemd[1]: sshd@4-172.24.4.17:22-172.24.4.1:57864.service: Deactivated successfully. May 13 08:41:52.223293 systemd[1]: session-5.scope: Deactivated successfully. May 13 08:41:52.225162 systemd-logind[1141]: Session 5 logged out. Waiting for processes to exit. May 13 08:41:52.228355 systemd-logind[1141]: Removed session 5. May 13 08:41:53.374443 sshd[1269]: Accepted publickey for core from 172.24.4.1 port 57866 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:41:53.377670 sshd[1269]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:41:53.387627 systemd-logind[1141]: New session 6 of user core. May 13 08:41:53.388386 systemd[1]: Started session-6.scope. May 13 08:41:54.018535 sshd[1269]: pam_unix(sshd:session): session closed for user core May 13 08:41:54.023538 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 13 08:41:54.023905 systemd[1]: Stopped kubelet.service. May 13 08:41:54.026952 systemd[1]: Starting kubelet.service... May 13 08:41:54.031595 systemd[1]: Started sshd@6-172.24.4.17:22-172.24.4.1:54596.service. May 13 08:41:54.033333 systemd[1]: sshd@5-172.24.4.17:22-172.24.4.1:57866.service: Deactivated successfully. May 13 08:41:54.037651 systemd[1]: session-6.scope: Deactivated successfully. May 13 08:41:54.053821 systemd-logind[1141]: Session 6 logged out. Waiting for processes to exit. May 13 08:41:54.058042 systemd-logind[1141]: Removed session 6. May 13 08:41:54.260850 systemd[1]: Started kubelet.service. May 13 08:41:54.413549 kubelet[1281]: E0513 08:41:54.413367 1281 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 08:41:54.417841 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 08:41:54.418219 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 08:41:55.341986 sshd[1276]: Accepted publickey for core from 172.24.4.1 port 54596 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:41:55.344750 sshd[1276]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:41:55.355561 systemd-logind[1141]: New session 7 of user core. May 13 08:41:55.356315 systemd[1]: Started session-7.scope. May 13 08:41:55.844104 sudo[1289]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 13 08:41:55.845522 sudo[1289]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 08:41:55.858469 dbus-daemon[1133]: Э\xa3!\xf9U: received setenforce notice (enforcing=1906468448) May 13 08:41:55.862350 sudo[1289]: pam_unix(sudo:session): session closed for user root May 13 08:41:56.085013 sshd[1276]: pam_unix(sshd:session): session closed for user core May 13 08:41:56.094697 systemd[1]: Started sshd@7-172.24.4.17:22-172.24.4.1:54608.service. May 13 08:41:56.098358 systemd[1]: sshd@6-172.24.4.17:22-172.24.4.1:54596.service: Deactivated successfully. May 13 08:41:56.100760 systemd[1]: session-7.scope: Deactivated successfully. May 13 08:41:56.104643 systemd-logind[1141]: Session 7 logged out. Waiting for processes to exit. May 13 08:41:56.107026 systemd-logind[1141]: Removed session 7. May 13 08:41:57.296420 sshd[1292]: Accepted publickey for core from 172.24.4.1 port 54608 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:41:57.299196 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:41:57.309761 systemd-logind[1141]: New session 8 of user core. May 13 08:41:57.310497 systemd[1]: Started session-8.scope. May 13 08:41:57.770996 sudo[1297]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 13 08:41:57.771554 sudo[1297]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 08:41:57.778238 sudo[1297]: pam_unix(sudo:session): session closed for user root May 13 08:41:57.789329 sudo[1296]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 13 08:41:57.790424 sudo[1296]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 08:41:57.813251 systemd[1]: Stopping audit-rules.service... May 13 08:41:57.813000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 08:41:57.817710 kernel: kauditd_printk_skb: 175 callbacks suppressed May 13 08:41:57.817825 kernel: audit: type=1305 audit(1747125717.813:205): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 13 08:41:57.813000 audit[1300]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe190dd380 a2=420 a3=0 items=0 ppid=1 pid=1300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:41:57.825600 auditctl[1300]: No rules May 13 08:41:57.840760 kernel: audit: type=1300 audit(1747125717.813:205): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe190dd380 a2=420 a3=0 items=0 ppid=1 pid=1300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:41:57.826681 systemd[1]: audit-rules.service: Deactivated successfully. May 13 08:41:57.827036 systemd[1]: Stopped audit-rules.service. May 13 08:41:57.842170 systemd[1]: Starting audit-rules.service... May 13 08:41:57.813000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 13 08:41:57.849899 kernel: audit: type=1327 audit(1747125717.813:205): proctitle=2F7362696E2F617564697463746C002D44 May 13 08:41:57.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:57.862165 kernel: audit: type=1131 audit(1747125717.824:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:57.883088 augenrules[1317]: No rules May 13 08:41:57.883913 systemd[1]: Finished audit-rules.service. May 13 08:41:57.885034 sudo[1296]: pam_unix(sudo:session): session closed for user root May 13 08:41:57.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:57.883000 audit[1296]: USER_END pid=1296 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 08:41:57.896491 kernel: audit: type=1130 audit(1747125717.883:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:57.896542 kernel: audit: type=1106 audit(1747125717.883:208): pid=1296 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 08:41:57.896569 kernel: audit: type=1104 audit(1747125717.884:209): pid=1296 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 08:41:57.884000 audit[1296]: CRED_DISP pid=1296 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 08:41:58.037983 sshd[1292]: pam_unix(sshd:session): session closed for user core May 13 08:41:58.063196 kernel: audit: type=1106 audit(1747125718.044:210): pid=1292 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:41:58.044000 audit[1292]: USER_END pid=1292 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:41:58.049568 systemd[1]: Started sshd@8-172.24.4.17:22-172.24.4.1:54616.service. May 13 08:41:58.058810 systemd[1]: sshd@7-172.24.4.17:22-172.24.4.1:54608.service: Deactivated successfully. May 13 08:41:58.060334 systemd[1]: session-8.scope: Deactivated successfully. May 13 08:41:58.044000 audit[1292]: CRED_DISP pid=1292 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:41:58.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.17:22-172.24.4.1:54616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:58.093700 kernel: audit: type=1104 audit(1747125718.044:211): pid=1292 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:41:58.093806 kernel: audit: type=1130 audit(1747125718.048:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.17:22-172.24.4.1:54616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:58.093761 systemd-logind[1141]: Session 8 logged out. Waiting for processes to exit. May 13 08:41:58.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.17:22-172.24.4.1:54608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:41:58.095898 systemd-logind[1141]: Removed session 8. May 13 08:41:59.241000 audit[1322]: USER_ACCT pid=1322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:41:59.243623 sshd[1322]: Accepted publickey for core from 172.24.4.1 port 54616 ssh2: RSA SHA256:ujy1IZCwkGt29P2AJzymKYpB6P+04yS6ZPkcpK9IyQk May 13 08:41:59.244000 audit[1322]: CRED_ACQ pid=1322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:41:59.244000 audit[1322]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd643dfd0 a2=3 a3=0 items=0 ppid=1 pid=1322 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:41:59.244000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 13 08:41:59.247278 sshd[1322]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 13 08:41:59.258332 systemd[1]: Started session-9.scope. May 13 08:41:59.260286 systemd-logind[1141]: New session 9 of user core. May 13 08:41:59.270000 audit[1322]: USER_START pid=1322 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:41:59.273000 audit[1325]: CRED_ACQ pid=1325 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:41:59.715000 audit[1326]: USER_ACCT pid=1326 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 08:41:59.717108 sudo[1326]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 13 08:41:59.716000 audit[1326]: CRED_REFR pid=1326 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 08:41:59.718509 sudo[1326]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 13 08:41:59.721000 audit[1326]: USER_START pid=1326 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 08:41:59.748320 systemd[1]: Starting coreos-metadata.service... May 13 08:42:04.669953 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 13 08:42:04.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:04.670752 systemd[1]: Stopped kubelet.service. May 13 08:42:04.683209 kernel: kauditd_printk_skb: 11 callbacks suppressed May 13 08:42:04.683364 kernel: audit: type=1130 audit(1747125724.669:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:04.675026 systemd[1]: Starting kubelet.service... May 13 08:42:04.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:04.698796 kernel: audit: type=1131 audit(1747125724.669:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:04.955945 systemd[1]: Started kubelet.service. May 13 08:42:04.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:04.970161 kernel: audit: type=1130 audit(1747125724.955:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:05.111993 kubelet[1339]: E0513 08:42:05.111932 1339 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 13 08:42:05.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 08:42:05.115387 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 13 08:42:05.115510 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 13 08:42:05.128712 kernel: audit: type=1131 audit(1747125725.114:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 13 08:42:06.822772 coreos-metadata[1330]: May 13 08:42:06.822 WARN failed to locate config-drive, using the metadata service API instead May 13 08:42:06.915995 coreos-metadata[1330]: May 13 08:42:06.915 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 May 13 08:42:07.204861 coreos-metadata[1330]: May 13 08:42:07.204 INFO Fetch successful May 13 08:42:07.204861 coreos-metadata[1330]: May 13 08:42:07.204 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 May 13 08:42:07.219544 coreos-metadata[1330]: May 13 08:42:07.219 INFO Fetch successful May 13 08:42:07.219544 coreos-metadata[1330]: May 13 08:42:07.219 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 May 13 08:42:07.232952 coreos-metadata[1330]: May 13 08:42:07.232 INFO Fetch successful May 13 08:42:07.232952 coreos-metadata[1330]: May 13 08:42:07.232 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 May 13 08:42:07.247305 coreos-metadata[1330]: May 13 08:42:07.247 INFO Fetch successful May 13 08:42:07.247305 coreos-metadata[1330]: May 13 08:42:07.247 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 May 13 08:42:07.263787 coreos-metadata[1330]: May 13 08:42:07.263 INFO Fetch successful May 13 08:42:07.281084 systemd[1]: Finished coreos-metadata.service. May 13 08:42:07.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:07.295184 kernel: audit: type=1130 audit(1747125727.282:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:08.486358 systemd[1]: Stopped kubelet.service. May 13 08:42:08.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:08.496180 systemd[1]: Starting kubelet.service... May 13 08:42:08.500181 kernel: audit: type=1130 audit(1747125728.486:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:08.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:08.514659 kernel: audit: type=1131 audit(1747125728.486:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:08.557390 systemd[1]: Reloading. May 13 08:42:08.655556 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-05-13T08:42:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 13 08:42:08.655595 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-05-13T08:42:08Z" level=info msg="torcx already run" May 13 08:42:08.777462 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 13 08:42:08.777635 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 13 08:42:08.800201 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 13 08:42:08.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.874221 kernel: audit: type=1400 audit(1747125728.868:229): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.874348 kernel: audit: type=1400 audit(1747125728.868:230): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892356 kernel: audit: type=1400 audit(1747125728.877:231): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.878000 audit: BPF prog-id=40 op=LOAD May 13 08:42:08.878000 audit: BPF prog-id=35 op=UNLOAD May 13 08:42:08.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.890000 audit: BPF prog-id=41 op=LOAD May 13 08:42:08.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.891000 audit: BPF prog-id=42 op=LOAD May 13 08:42:08.891000 audit: BPF prog-id=36 op=UNLOAD May 13 08:42:08.891000 audit: BPF prog-id=37 op=UNLOAD May 13 08:42:08.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.891000 audit: BPF prog-id=43 op=LOAD May 13 08:42:08.891000 audit: BPF prog-id=38 op=UNLOAD May 13 08:42:08.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit: BPF prog-id=44 op=LOAD May 13 08:42:08.892000 audit: BPF prog-id=24 op=UNLOAD May 13 08:42:08.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit: BPF prog-id=45 op=LOAD May 13 08:42:08.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.894000 audit: BPF prog-id=47 op=LOAD May 13 08:42:08.894000 audit: BPF prog-id=27 op=UNLOAD May 13 08:42:08.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit: BPF prog-id=51 op=LOAD May 13 08:42:08.897000 audit: BPF prog-id=33 op=UNLOAD May 13 08:42:08.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit: BPF prog-id=52 op=LOAD May 13 08:42:08.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.897000 audit: BPF prog-id=53 op=LOAD May 13 08:42:08.897000 audit: BPF prog-id=30 op=UNLOAD May 13 08:42:08.897000 audit: BPF prog-id=31 op=UNLOAD May 13 08:42:08.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:08.899000 audit: BPF prog-id=54 op=LOAD May 13 08:42:08.899000 audit: BPF prog-id=32 op=UNLOAD May 13 08:42:08.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:08.922521 systemd[1]: Started kubelet.service. May 13 08:42:08.928181 systemd[1]: Stopping kubelet.service... May 13 08:42:08.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:08.929646 systemd[1]: kubelet.service: Deactivated successfully. May 13 08:42:08.929813 systemd[1]: Stopped kubelet.service. May 13 08:42:08.932019 systemd[1]: Starting kubelet.service... May 13 08:42:09.041506 systemd[1]: Started kubelet.service. May 13 08:42:09.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:09.216827 kubelet[1454]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 08:42:09.217509 kubelet[1454]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 13 08:42:09.217655 kubelet[1454]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 13 08:42:09.284410 kubelet[1454]: I0513 08:42:09.284301 1454 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 13 08:42:09.678027 kubelet[1454]: I0513 08:42:09.677994 1454 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 13 08:42:09.678238 kubelet[1454]: I0513 08:42:09.678227 1454 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 13 08:42:09.678585 kubelet[1454]: I0513 08:42:09.678570 1454 server.go:929] "Client rotation is on, will bootstrap in background" May 13 08:42:09.712422 kubelet[1454]: I0513 08:42:09.712391 1454 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 13 08:42:09.732332 kubelet[1454]: E0513 08:42:09.732289 1454 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 13 08:42:09.732492 kubelet[1454]: I0513 08:42:09.732478 1454 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 13 08:42:09.738150 kubelet[1454]: I0513 08:42:09.738113 1454 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 13 08:42:09.738358 kubelet[1454]: I0513 08:42:09.738346 1454 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 13 08:42:09.738665 kubelet[1454]: I0513 08:42:09.738627 1454 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 13 08:42:09.743573 kubelet[1454]: I0513 08:42:09.738725 1454 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.24.4.17","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 13 08:42:09.743573 kubelet[1454]: I0513 08:42:09.743441 1454 topology_manager.go:138] "Creating topology manager with none policy" May 13 08:42:09.743573 kubelet[1454]: I0513 08:42:09.743517 1454 container_manager_linux.go:300] "Creating device plugin manager" May 13 08:42:09.743791 kubelet[1454]: I0513 08:42:09.743772 1454 state_mem.go:36] "Initialized new in-memory state store" May 13 08:42:09.749800 kubelet[1454]: I0513 08:42:09.749770 1454 kubelet.go:408] "Attempting to sync node with API server" May 13 08:42:09.749981 kubelet[1454]: I0513 08:42:09.749970 1454 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 13 08:42:09.750084 kubelet[1454]: I0513 08:42:09.750074 1454 kubelet.go:314] "Adding apiserver pod source" May 13 08:42:09.750176 kubelet[1454]: I0513 08:42:09.750165 1454 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 13 08:42:09.752421 kubelet[1454]: E0513 08:42:09.752400 1454 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:09.761072 kubelet[1454]: E0513 08:42:09.752592 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:09.771734 kubelet[1454]: I0513 08:42:09.771711 1454 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 13 08:42:09.778678 kubelet[1454]: I0513 08:42:09.778661 1454 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 13 08:42:09.778841 kubelet[1454]: W0513 08:42:09.778830 1454 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 13 08:42:09.782032 kubelet[1454]: I0513 08:42:09.782016 1454 server.go:1269] "Started kubelet" May 13 08:42:09.786656 kubelet[1454]: I0513 08:42:09.786535 1454 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 13 08:42:09.787565 kubelet[1454]: I0513 08:42:09.787217 1454 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 13 08:42:09.795000 audit[1454]: AVC avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:09.798624 kubelet[1454]: I0513 08:42:09.798167 1454 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 13 08:42:09.798624 kubelet[1454]: I0513 08:42:09.798241 1454 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 13 08:42:09.798624 kubelet[1454]: I0513 08:42:09.798354 1454 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 13 08:42:09.801433 kernel: kauditd_printk_skb: 240 callbacks suppressed May 13 08:42:09.801505 kernel: audit: type=1400 audit(1747125729.795:370): avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:09.805591 kubelet[1454]: E0513 08:42:09.805568 1454 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 13 08:42:09.805857 kubelet[1454]: I0513 08:42:09.805815 1454 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 13 08:42:09.807079 kubelet[1454]: I0513 08:42:09.807063 1454 volume_manager.go:289] "Starting Kubelet Volume Manager" May 13 08:42:09.807354 kubelet[1454]: E0513 08:42:09.807339 1454 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.24.4.17\" not found" May 13 08:42:09.807629 kubelet[1454]: I0513 08:42:09.807617 1454 server.go:460] "Adding debug handlers to kubelet server" May 13 08:42:09.808840 kubelet[1454]: I0513 08:42:09.808826 1454 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 13 08:42:09.809002 kubelet[1454]: I0513 08:42:09.808978 1454 reconciler.go:26] "Reconciler: start to sync state" May 13 08:42:09.809779 kubelet[1454]: I0513 08:42:09.809764 1454 factory.go:221] Registration of the systemd container factory successfully May 13 08:42:09.809979 kubelet[1454]: I0513 08:42:09.809960 1454 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 13 08:42:09.812112 kubelet[1454]: I0513 08:42:09.812075 1454 factory.go:221] Registration of the containerd container factory successfully May 13 08:42:09.795000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 08:42:09.820038 kubelet[1454]: I0513 08:42:09.813270 1454 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 13 08:42:09.825168 kernel: audit: type=1401 audit(1747125729.795:370): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 08:42:09.795000 audit[1454]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009e1560 a1=c000661128 a2=c0009e1530 a3=25 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:09.842134 kubelet[1454]: I0513 08:42:09.842087 1454 cpu_manager.go:214] "Starting CPU manager" policy="none" May 13 08:42:09.842288 kubelet[1454]: I0513 08:42:09.842275 1454 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 13 08:42:09.842379 kubelet[1454]: I0513 08:42:09.842370 1454 state_mem.go:36] "Initialized new in-memory state store" May 13 08:42:09.795000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 08:42:09.853865 kernel: audit: type=1300 audit(1747125729.795:370): arch=c000003e syscall=188 success=no exit=-22 a0=c0009e1560 a1=c000661128 a2=c0009e1530 a3=25 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:09.853926 kernel: audit: type=1327 audit(1747125729.795:370): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 08:42:09.853950 kernel: audit: type=1400 audit(1747125729.795:371): avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:09.795000 audit[1454]: AVC avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:09.854029 kubelet[1454]: E0513 08:42:09.845557 1454 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.24.4.17\" not found" node="172.24.4.17" May 13 08:42:09.795000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 08:42:09.866202 kernel: audit: type=1401 audit(1747125729.795:371): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 08:42:09.866273 kernel: audit: type=1300 audit(1747125729.795:371): arch=c000003e syscall=188 success=no exit=-22 a0=c000a15320 a1=c000661140 a2=c0009e15f0 a3=25 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:09.795000 audit[1454]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a15320 a1=c000661140 a2=c0009e15f0 a3=25 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:09.873846 kernel: audit: type=1327 audit(1747125729.795:371): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 08:42:09.795000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 08:42:09.874373 kubelet[1454]: I0513 08:42:09.874355 1454 policy_none.go:49] "None policy: Start" May 13 08:42:09.875182 kubelet[1454]: I0513 08:42:09.875170 1454 memory_manager.go:170] "Starting memorymanager" policy="None" May 13 08:42:09.875283 kubelet[1454]: I0513 08:42:09.875274 1454 state_mem.go:35] "Initializing new in-memory state store" May 13 08:42:09.898243 systemd[1]: Created slice kubepods.slice. May 13 08:42:09.903506 systemd[1]: Created slice kubepods-burstable.slice. May 13 08:42:09.907058 systemd[1]: Created slice kubepods-besteffort.slice. May 13 08:42:09.907887 kubelet[1454]: E0513 08:42:09.907869 1454 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.24.4.17\" not found" May 13 08:42:09.912853 kubelet[1454]: I0513 08:42:09.912836 1454 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 13 08:42:09.911000 audit[1454]: AVC avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:09.913069 kubelet[1454]: I0513 08:42:09.913053 1454 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 13 08:42:09.913246 kubelet[1454]: I0513 08:42:09.913234 1454 eviction_manager.go:189] "Eviction manager: starting control loop" May 13 08:42:09.913435 kubelet[1454]: I0513 08:42:09.913401 1454 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 13 08:42:09.915037 kubelet[1454]: I0513 08:42:09.915023 1454 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 13 08:42:09.911000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 08:42:09.919242 kubelet[1454]: E0513 08:42:09.919224 1454 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.24.4.17\" not found" May 13 08:42:09.920836 kernel: audit: type=1400 audit(1747125729.911:372): avc: denied { mac_admin } for pid=1454 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:09.920919 kernel: audit: type=1401 audit(1747125729.911:372): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 13 08:42:09.911000 audit[1454]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d5fb60 a1=c000d67938 a2=c000d5fb30 a3=25 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:09.911000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 13 08:42:09.932000 audit[1470]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:09.932000 audit[1470]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe434c1e70 a2=0 a3=7ffe434c1e5c items=0 ppid=1454 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:09.932000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 08:42:09.936000 audit[1473]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:09.936000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd7ef2cf20 a2=0 a3=7ffd7ef2cf0c items=0 ppid=1454 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:09.936000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 08:42:09.939000 audit[1475]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1475 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:09.939000 audit[1475]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcbaa329f0 a2=0 a3=7ffcbaa329dc items=0 ppid=1454 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:09.939000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 08:42:09.955000 audit[1480]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:09.955000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffceb0788d0 a2=0 a3=7ffceb0788bc items=0 ppid=1454 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:09.955000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 08:42:10.011000 audit[1485]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:10.011000 audit[1485]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fffc40117e0 a2=0 a3=7fffc40117cc items=0 ppid=1454 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:10.011000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 13 08:42:10.016267 kubelet[1454]: I0513 08:42:10.016201 1454 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 13 08:42:10.017000 audit[1487]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:10.017000 audit[1487]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd727e67b0 a2=0 a3=7ffd727e679c items=0 ppid=1454 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:10.017000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 13 08:42:10.019038 kubelet[1454]: I0513 08:42:10.019005 1454 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 13 08:42:10.019435 kubelet[1454]: I0513 08:42:10.019403 1454 status_manager.go:217] "Starting to sync pod status with apiserver" May 13 08:42:10.019435 kubelet[1454]: I0513 08:42:10.019461 1454 kubelet.go:2321] "Starting kubelet main sync loop" May 13 08:42:10.019640 kubelet[1454]: E0513 08:42:10.019556 1454 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 13 08:42:10.020034 kubelet[1454]: I0513 08:42:10.020001 1454 kubelet_node_status.go:72] "Attempting to register node" node="172.24.4.17" May 13 08:42:10.019000 audit[1488]: NETFILTER_CFG table=mangle:8 family=10 entries=1 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:10.019000 audit[1488]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6d087160 a2=0 a3=7ffe6d08714c items=0 ppid=1454 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:10.019000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 08:42:10.020000 audit[1486]: NETFILTER_CFG table=mangle:9 family=2 entries=1 op=nft_register_chain pid=1486 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:10.020000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffa591ce30 a2=0 a3=7fffa591ce1c items=0 ppid=1454 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:10.020000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 13 08:42:10.023000 audit[1489]: NETFILTER_CFG table=nat:10 family=10 entries=2 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:10.023000 audit[1489]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff6cf4be30 a2=0 a3=7fff6cf4be1c items=0 ppid=1454 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:10.023000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 08:42:10.025000 audit[1491]: NETFILTER_CFG table=filter:11 family=10 entries=2 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:10.025000 audit[1491]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc2de00f70 a2=0 a3=7ffc2de00f5c items=0 ppid=1454 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:10.025000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 08:42:10.025000 audit[1490]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:10.025000 audit[1490]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff9fca2120 a2=0 a3=7fff9fca210c items=0 ppid=1454 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:10.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 13 08:42:10.030382 kubelet[1454]: I0513 08:42:10.030340 1454 kubelet_node_status.go:75] "Successfully registered node" node="172.24.4.17" May 13 08:42:10.031000 audit[1492]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1492 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:10.031000 audit[1492]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc87462100 a2=0 a3=7ffc874620ec items=0 ppid=1454 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:10.031000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 13 08:42:10.067862 kubelet[1454]: I0513 08:42:10.067791 1454 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 13 08:42:10.068193 env[1147]: time="2025-05-13T08:42:10.068152867Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 13 08:42:10.068775 kubelet[1454]: I0513 08:42:10.068337 1454 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 13 08:42:10.108033 sudo[1326]: pam_unix(sudo:session): session closed for user root May 13 08:42:10.107000 audit[1326]: USER_END pid=1326 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 08:42:10.107000 audit[1326]: CRED_DISP pid=1326 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 13 08:42:10.356623 sshd[1322]: pam_unix(sshd:session): session closed for user core May 13 08:42:10.359000 audit[1322]: USER_END pid=1322 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:10.360000 audit[1322]: CRED_DISP pid=1322 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 13 08:42:10.364038 systemd[1]: sshd@8-172.24.4.17:22-172.24.4.1:54616.service: Deactivated successfully. May 13 08:42:10.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.17:22-172.24.4.1:54616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 13 08:42:10.365680 systemd[1]: session-9.scope: Deactivated successfully. May 13 08:42:10.367017 systemd-logind[1141]: Session 9 logged out. Waiting for processes to exit. May 13 08:42:10.368902 systemd-logind[1141]: Removed session 9. May 13 08:42:10.681101 kubelet[1454]: I0513 08:42:10.680797 1454 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 13 08:42:10.682398 kubelet[1454]: W0513 08:42:10.681834 1454 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 13 08:42:10.682398 kubelet[1454]: W0513 08:42:10.681944 1454 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 13 08:42:10.682398 kubelet[1454]: W0513 08:42:10.682003 1454 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 13 08:42:10.753288 kubelet[1454]: I0513 08:42:10.753207 1454 apiserver.go:52] "Watching apiserver" May 13 08:42:10.762288 kubelet[1454]: E0513 08:42:10.762053 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:10.763075 kubelet[1454]: E0513 08:42:10.762994 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-g84xq" podUID="1844c58a-5bb2-45ae-9956-e2c503a474fa" May 13 08:42:10.773830 systemd[1]: Created slice kubepods-besteffort-pod8265462a_8f92_456d_acc1_8cbad7535c17.slice. May 13 08:42:10.798862 systemd[1]: Created slice kubepods-besteffort-podb5a9f865_0c8e_44e3_b818_cf221f71b0d7.slice. May 13 08:42:10.810824 kubelet[1454]: I0513 08:42:10.810749 1454 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 13 08:42:10.816186 kubelet[1454]: I0513 08:42:10.816011 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b5a9f865-0c8e-44e3-b818-cf221f71b0d7-tigera-ca-bundle\") pod \"calico-node-gs6lw\" (UID: \"b5a9f865-0c8e-44e3-b818-cf221f71b0d7\") " pod="calico-system/calico-node-gs6lw" May 13 08:42:10.816561 kubelet[1454]: I0513 08:42:10.816521 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b5a9f865-0c8e-44e3-b818-cf221f71b0d7-cni-net-dir\") pod \"calico-node-gs6lw\" (UID: \"b5a9f865-0c8e-44e3-b818-cf221f71b0d7\") " pod="calico-system/calico-node-gs6lw" May 13 08:42:10.816957 kubelet[1454]: I0513 08:42:10.816872 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n8pjd\" (UniqueName: \"kubernetes.io/projected/b5a9f865-0c8e-44e3-b818-cf221f71b0d7-kube-api-access-n8pjd\") pod \"calico-node-gs6lw\" (UID: \"b5a9f865-0c8e-44e3-b818-cf221f71b0d7\") " pod="calico-system/calico-node-gs6lw" May 13 08:42:10.817402 kubelet[1454]: I0513 08:42:10.817308 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m9b56\" (UniqueName: \"kubernetes.io/projected/1844c58a-5bb2-45ae-9956-e2c503a474fa-kube-api-access-m9b56\") pod \"csi-node-driver-g84xq\" (UID: \"1844c58a-5bb2-45ae-9956-e2c503a474fa\") " pod="calico-system/csi-node-driver-g84xq" May 13 08:42:10.817693 kubelet[1454]: I0513 08:42:10.817611 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8265462a-8f92-456d-acc1-8cbad7535c17-xtables-lock\") pod \"kube-proxy-67s4h\" (UID: \"8265462a-8f92-456d-acc1-8cbad7535c17\") " pod="kube-system/kube-proxy-67s4h" May 13 08:42:10.818053 kubelet[1454]: I0513 08:42:10.817994 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8265462a-8f92-456d-acc1-8cbad7535c17-lib-modules\") pod \"kube-proxy-67s4h\" (UID: \"8265462a-8f92-456d-acc1-8cbad7535c17\") " pod="kube-system/kube-proxy-67s4h" May 13 08:42:10.818426 kubelet[1454]: I0513 08:42:10.818366 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b5a9f865-0c8e-44e3-b818-cf221f71b0d7-cni-bin-dir\") pod \"calico-node-gs6lw\" (UID: \"b5a9f865-0c8e-44e3-b818-cf221f71b0d7\") " pod="calico-system/calico-node-gs6lw" May 13 08:42:10.818727 kubelet[1454]: I0513 08:42:10.818693 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b5a9f865-0c8e-44e3-b818-cf221f71b0d7-flexvol-driver-host\") pod \"calico-node-gs6lw\" (UID: \"b5a9f865-0c8e-44e3-b818-cf221f71b0d7\") " pod="calico-system/calico-node-gs6lw" May 13 08:42:10.819091 kubelet[1454]: I0513 08:42:10.819031 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/1844c58a-5bb2-45ae-9956-e2c503a474fa-registration-dir\") pod \"csi-node-driver-g84xq\" (UID: \"1844c58a-5bb2-45ae-9956-e2c503a474fa\") " pod="calico-system/csi-node-driver-g84xq" May 13 08:42:10.819496 kubelet[1454]: I0513 08:42:10.819385 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/8265462a-8f92-456d-acc1-8cbad7535c17-kube-proxy\") pod \"kube-proxy-67s4h\" (UID: \"8265462a-8f92-456d-acc1-8cbad7535c17\") " pod="kube-system/kube-proxy-67s4h" May 13 08:42:10.819784 kubelet[1454]: I0513 08:42:10.819702 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b5a9f865-0c8e-44e3-b818-cf221f71b0d7-node-certs\") pod \"calico-node-gs6lw\" (UID: \"b5a9f865-0c8e-44e3-b818-cf221f71b0d7\") " pod="calico-system/calico-node-gs6lw" May 13 08:42:10.820149 kubelet[1454]: I0513 08:42:10.820064 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/1844c58a-5bb2-45ae-9956-e2c503a474fa-kubelet-dir\") pod \"csi-node-driver-g84xq\" (UID: \"1844c58a-5bb2-45ae-9956-e2c503a474fa\") " pod="calico-system/csi-node-driver-g84xq" May 13 08:42:10.820539 kubelet[1454]: I0513 08:42:10.820423 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/1844c58a-5bb2-45ae-9956-e2c503a474fa-socket-dir\") pod \"csi-node-driver-g84xq\" (UID: \"1844c58a-5bb2-45ae-9956-e2c503a474fa\") " pod="calico-system/csi-node-driver-g84xq" May 13 08:42:10.820889 kubelet[1454]: I0513 08:42:10.820832 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b5a9f865-0c8e-44e3-b818-cf221f71b0d7-xtables-lock\") pod \"calico-node-gs6lw\" (UID: \"b5a9f865-0c8e-44e3-b818-cf221f71b0d7\") " pod="calico-system/calico-node-gs6lw" May 13 08:42:10.821235 kubelet[1454]: I0513 08:42:10.821114 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b5a9f865-0c8e-44e3-b818-cf221f71b0d7-policysync\") pod \"calico-node-gs6lw\" (UID: \"b5a9f865-0c8e-44e3-b818-cf221f71b0d7\") " pod="calico-system/calico-node-gs6lw" May 13 08:42:10.821622 kubelet[1454]: I0513 08:42:10.821533 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b5a9f865-0c8e-44e3-b818-cf221f71b0d7-var-run-calico\") pod \"calico-node-gs6lw\" (UID: \"b5a9f865-0c8e-44e3-b818-cf221f71b0d7\") " pod="calico-system/calico-node-gs6lw" May 13 08:42:10.821953 kubelet[1454]: I0513 08:42:10.821839 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b5a9f865-0c8e-44e3-b818-cf221f71b0d7-var-lib-calico\") pod \"calico-node-gs6lw\" (UID: \"b5a9f865-0c8e-44e3-b818-cf221f71b0d7\") " pod="calico-system/calico-node-gs6lw" May 13 08:42:10.822313 kubelet[1454]: I0513 08:42:10.822208 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b5a9f865-0c8e-44e3-b818-cf221f71b0d7-cni-log-dir\") pod \"calico-node-gs6lw\" (UID: \"b5a9f865-0c8e-44e3-b818-cf221f71b0d7\") " pod="calico-system/calico-node-gs6lw" May 13 08:42:10.822645 kubelet[1454]: I0513 08:42:10.822583 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/1844c58a-5bb2-45ae-9956-e2c503a474fa-varrun\") pod \"csi-node-driver-g84xq\" (UID: \"1844c58a-5bb2-45ae-9956-e2c503a474fa\") " pod="calico-system/csi-node-driver-g84xq" May 13 08:42:10.822952 kubelet[1454]: I0513 08:42:10.822917 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9rpjg\" (UniqueName: \"kubernetes.io/projected/8265462a-8f92-456d-acc1-8cbad7535c17-kube-api-access-9rpjg\") pod \"kube-proxy-67s4h\" (UID: \"8265462a-8f92-456d-acc1-8cbad7535c17\") " pod="kube-system/kube-proxy-67s4h" May 13 08:42:10.823295 kubelet[1454]: I0513 08:42:10.823234 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b5a9f865-0c8e-44e3-b818-cf221f71b0d7-lib-modules\") pod \"calico-node-gs6lw\" (UID: \"b5a9f865-0c8e-44e3-b818-cf221f71b0d7\") " pod="calico-system/calico-node-gs6lw" May 13 08:42:10.926255 kubelet[1454]: E0513 08:42:10.926189 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.926255 kubelet[1454]: W0513 08:42:10.926240 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.926593 kubelet[1454]: E0513 08:42:10.926279 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.926676 kubelet[1454]: E0513 08:42:10.926593 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.926676 kubelet[1454]: W0513 08:42:10.926617 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.926676 kubelet[1454]: E0513 08:42:10.926639 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.926997 kubelet[1454]: E0513 08:42:10.926929 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.926997 kubelet[1454]: W0513 08:42:10.926957 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.926997 kubelet[1454]: E0513 08:42:10.926981 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.927490 kubelet[1454]: E0513 08:42:10.927445 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.927490 kubelet[1454]: W0513 08:42:10.927477 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.927679 kubelet[1454]: E0513 08:42:10.927499 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.927880 kubelet[1454]: E0513 08:42:10.927816 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.927880 kubelet[1454]: W0513 08:42:10.927844 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.927880 kubelet[1454]: E0513 08:42:10.927867 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.928291 kubelet[1454]: E0513 08:42:10.928247 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.928291 kubelet[1454]: W0513 08:42:10.928282 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.928502 kubelet[1454]: E0513 08:42:10.928306 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.928636 kubelet[1454]: E0513 08:42:10.928595 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.928636 kubelet[1454]: W0513 08:42:10.928628 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.928822 kubelet[1454]: E0513 08:42:10.928649 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.928971 kubelet[1454]: E0513 08:42:10.928930 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.928971 kubelet[1454]: W0513 08:42:10.928963 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.929332 kubelet[1454]: E0513 08:42:10.929282 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.929804 kubelet[1454]: E0513 08:42:10.929320 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.929804 kubelet[1454]: W0513 08:42:10.929749 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.930266 kubelet[1454]: E0513 08:42:10.930223 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.930385 kubelet[1454]: W0513 08:42:10.930252 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.931625 kubelet[1454]: E0513 08:42:10.931502 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.934398 kubelet[1454]: W0513 08:42:10.934047 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.936068 kubelet[1454]: E0513 08:42:10.935999 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.936068 kubelet[1454]: E0513 08:42:10.936052 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.936304 kubelet[1454]: E0513 08:42:10.936076 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.936647 kubelet[1454]: E0513 08:42:10.936618 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.936822 kubelet[1454]: W0513 08:42:10.936793 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.937095 kubelet[1454]: E0513 08:42:10.937049 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.937742 kubelet[1454]: E0513 08:42:10.937714 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.937942 kubelet[1454]: W0513 08:42:10.937912 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.938765 kubelet[1454]: E0513 08:42:10.938718 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.939139 kubelet[1454]: W0513 08:42:10.939065 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.939379 kubelet[1454]: E0513 08:42:10.938859 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.939379 kubelet[1454]: I0513 08:42:10.938824 1454 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 13 08:42:10.940003 kubelet[1454]: E0513 08:42:10.939975 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.940434 kubelet[1454]: W0513 08:42:10.940364 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.941712 kubelet[1454]: E0513 08:42:10.940330 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.941940 kubelet[1454]: E0513 08:42:10.941907 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.954469 kubelet[1454]: E0513 08:42:10.952079 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.954469 kubelet[1454]: W0513 08:42:10.952317 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.954469 kubelet[1454]: E0513 08:42:10.952441 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.954469 kubelet[1454]: E0513 08:42:10.954211 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.954469 kubelet[1454]: W0513 08:42:10.954300 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.954850 kubelet[1454]: E0513 08:42:10.954521 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.954923 kubelet[1454]: E0513 08:42:10.954850 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.954923 kubelet[1454]: W0513 08:42:10.954872 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.955075 kubelet[1454]: E0513 08:42:10.955027 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.955384 kubelet[1454]: E0513 08:42:10.955332 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.955384 kubelet[1454]: W0513 08:42:10.955366 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.955749 kubelet[1454]: E0513 08:42:10.955681 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.955878 kubelet[1454]: E0513 08:42:10.955756 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.955878 kubelet[1454]: W0513 08:42:10.955775 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.956152 kubelet[1454]: E0513 08:42:10.956071 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.956152 kubelet[1454]: W0513 08:42:10.956104 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.957029 kubelet[1454]: E0513 08:42:10.956982 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.957029 kubelet[1454]: E0513 08:42:10.957028 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.957339 kubelet[1454]: E0513 08:42:10.957300 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.957339 kubelet[1454]: W0513 08:42:10.957334 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.957637 kubelet[1454]: E0513 08:42:10.957596 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.957805 kubelet[1454]: E0513 08:42:10.957640 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.958018 kubelet[1454]: W0513 08:42:10.957982 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.958400 kubelet[1454]: E0513 08:42:10.958350 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.959059 kubelet[1454]: E0513 08:42:10.959031 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.959277 kubelet[1454]: W0513 08:42:10.959247 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.959568 kubelet[1454]: E0513 08:42:10.959519 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.960096 kubelet[1454]: E0513 08:42:10.960069 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.960328 kubelet[1454]: W0513 08:42:10.960297 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.960581 kubelet[1454]: E0513 08:42:10.960534 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.961207 kubelet[1454]: E0513 08:42:10.961180 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.971948 kubelet[1454]: W0513 08:42:10.971916 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.972412 kubelet[1454]: E0513 08:42:10.972380 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.972773 kubelet[1454]: E0513 08:42:10.972697 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.973001 kubelet[1454]: W0513 08:42:10.972966 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.973319 kubelet[1454]: E0513 08:42:10.973265 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.973890 kubelet[1454]: E0513 08:42:10.973863 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.974075 kubelet[1454]: W0513 08:42:10.974047 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.974394 kubelet[1454]: E0513 08:42:10.974346 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.974934 kubelet[1454]: E0513 08:42:10.974907 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.975104 kubelet[1454]: W0513 08:42:10.975077 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.975385 kubelet[1454]: E0513 08:42:10.975340 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.975978 kubelet[1454]: E0513 08:42:10.975951 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.976215 kubelet[1454]: W0513 08:42:10.976181 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.976489 kubelet[1454]: E0513 08:42:10.976437 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.976964 kubelet[1454]: E0513 08:42:10.976938 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.977189 kubelet[1454]: W0513 08:42:10.977110 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.977415 kubelet[1454]: E0513 08:42:10.977367 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.977844 kubelet[1454]: E0513 08:42:10.977817 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.978013 kubelet[1454]: W0513 08:42:10.977986 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.978286 kubelet[1454]: E0513 08:42:10.978216 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.978767 kubelet[1454]: E0513 08:42:10.978742 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.978942 kubelet[1454]: W0513 08:42:10.978913 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.979225 kubelet[1454]: E0513 08:42:10.979141 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.979785 kubelet[1454]: E0513 08:42:10.979759 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.979956 kubelet[1454]: W0513 08:42:10.979929 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.980229 kubelet[1454]: E0513 08:42:10.980180 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.980686 kubelet[1454]: E0513 08:42:10.980660 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.980866 kubelet[1454]: W0513 08:42:10.980836 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.981085 kubelet[1454]: E0513 08:42:10.981038 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.981661 kubelet[1454]: E0513 08:42:10.981635 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.981821 kubelet[1454]: W0513 08:42:10.981795 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.982055 kubelet[1454]: E0513 08:42:10.982007 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.982601 kubelet[1454]: E0513 08:42:10.982575 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.982759 kubelet[1454]: W0513 08:42:10.982733 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.982977 kubelet[1454]: E0513 08:42:10.982924 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.983551 kubelet[1454]: E0513 08:42:10.983526 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.983725 kubelet[1454]: W0513 08:42:10.983698 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.983954 kubelet[1454]: E0513 08:42:10.983906 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.984504 kubelet[1454]: E0513 08:42:10.984476 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.984676 kubelet[1454]: W0513 08:42:10.984649 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.984932 kubelet[1454]: E0513 08:42:10.984900 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.985657 kubelet[1454]: E0513 08:42:10.985631 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.985815 kubelet[1454]: W0513 08:42:10.985789 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.986230 kubelet[1454]: E0513 08:42:10.986199 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.986533 kubelet[1454]: E0513 08:42:10.986434 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.986688 kubelet[1454]: W0513 08:42:10.986661 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.986927 kubelet[1454]: E0513 08:42:10.986868 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.987520 kubelet[1454]: E0513 08:42:10.987494 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.987780 kubelet[1454]: W0513 08:42:10.987753 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.988007 kubelet[1454]: E0513 08:42:10.987956 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.988518 kubelet[1454]: E0513 08:42:10.988492 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.988693 kubelet[1454]: W0513 08:42:10.988664 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.989043 kubelet[1454]: E0513 08:42:10.989012 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.989450 kubelet[1454]: E0513 08:42:10.989426 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.989605 kubelet[1454]: W0513 08:42:10.989580 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.989840 kubelet[1454]: E0513 08:42:10.989788 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.990343 kubelet[1454]: E0513 08:42:10.990317 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.990519 kubelet[1454]: W0513 08:42:10.990491 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.990748 kubelet[1454]: E0513 08:42:10.990698 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.991283 kubelet[1454]: E0513 08:42:10.991255 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.991470 kubelet[1454]: W0513 08:42:10.991441 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.991925 kubelet[1454]: E0513 08:42:10.991900 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.992078 kubelet[1454]: W0513 08:42:10.992053 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.992621 kubelet[1454]: E0513 08:42:10.992596 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:10.992790 kubelet[1454]: W0513 08:42:10.992762 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:10.992958 kubelet[1454]: E0513 08:42:10.992929 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.993186 kubelet[1454]: E0513 08:42:10.993111 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:10.993372 kubelet[1454]: E0513 08:42:10.993343 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:11.006694 kubelet[1454]: E0513 08:42:11.006636 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:11.006694 kubelet[1454]: W0513 08:42:11.006678 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:11.006909 kubelet[1454]: E0513 08:42:11.006716 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:11.019301 kubelet[1454]: E0513 08:42:11.019283 1454 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 13 08:42:11.019460 kubelet[1454]: W0513 08:42:11.019445 1454 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 13 08:42:11.019533 kubelet[1454]: E0513 08:42:11.019520 1454 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 13 08:42:11.095069 env[1147]: time="2025-05-13T08:42:11.094799773Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-67s4h,Uid:8265462a-8f92-456d-acc1-8cbad7535c17,Namespace:kube-system,Attempt:0,}" May 13 08:42:11.108687 env[1147]: time="2025-05-13T08:42:11.108613150Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gs6lw,Uid:b5a9f865-0c8e-44e3-b818-cf221f71b0d7,Namespace:calico-system,Attempt:0,}" May 13 08:42:11.763423 kubelet[1454]: E0513 08:42:11.763234 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:11.891242 env[1147]: time="2025-05-13T08:42:11.891098100Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:11.893400 env[1147]: time="2025-05-13T08:42:11.893326753Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:11.898480 env[1147]: time="2025-05-13T08:42:11.898403382Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:11.903312 env[1147]: time="2025-05-13T08:42:11.903249740Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:11.906311 env[1147]: time="2025-05-13T08:42:11.906258258Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:11.910951 env[1147]: time="2025-05-13T08:42:11.910898981Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:11.916810 env[1147]: time="2025-05-13T08:42:11.916741729Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:11.919177 env[1147]: time="2025-05-13T08:42:11.919081806Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:11.950040 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount903172470.mount: Deactivated successfully. May 13 08:42:11.961710 env[1147]: time="2025-05-13T08:42:11.960692478Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 08:42:11.961710 env[1147]: time="2025-05-13T08:42:11.960752749Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 08:42:11.961710 env[1147]: time="2025-05-13T08:42:11.960776541Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 08:42:11.961710 env[1147]: time="2025-05-13T08:42:11.960972420Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b25256111352127aec578aca28cc88d98f05b1d399310de27b2c83671b9867e4 pid=1557 runtime=io.containerd.runc.v2 May 13 08:42:11.979867 env[1147]: time="2025-05-13T08:42:11.979713724Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 08:42:11.980053 env[1147]: time="2025-05-13T08:42:11.979888593Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 08:42:11.980053 env[1147]: time="2025-05-13T08:42:11.979958180Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 08:42:11.980380 env[1147]: time="2025-05-13T08:42:11.980292050Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0bfea75fe67740494419d3c75f87f1184970c0343d7667cfde536b6058914498 pid=1576 runtime=io.containerd.runc.v2 May 13 08:42:12.006855 systemd[1]: run-containerd-runc-k8s.io-b25256111352127aec578aca28cc88d98f05b1d399310de27b2c83671b9867e4-runc.yH9CIi.mount: Deactivated successfully. May 13 08:42:12.011381 systemd[1]: Started cri-containerd-b25256111352127aec578aca28cc88d98f05b1d399310de27b2c83671b9867e4.scope. May 13 08:42:12.017726 systemd[1]: Started cri-containerd-0bfea75fe67740494419d3c75f87f1184970c0343d7667cfde536b6058914498.scope. May 13 08:42:12.024814 kubelet[1454]: E0513 08:42:12.024780 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-g84xq" podUID="1844c58a-5bb2-45ae-9956-e2c503a474fa" May 13 08:42:12.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.032000 audit: BPF prog-id=55 op=LOAD May 13 08:42:12.033000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.033000 audit[1581]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1557 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:12.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232353235363131313335323132376165633537386163613238636338 May 13 08:42:12.033000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.033000 audit[1581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1557 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:12.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232353235363131313335323132376165633537386163613238636338 May 13 08:42:12.033000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.033000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.033000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.033000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.033000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.033000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.033000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.033000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.033000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.033000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.033000 audit: BPF prog-id=56 op=LOAD May 13 08:42:12.033000 audit[1581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003587f0 items=0 ppid=1557 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:12.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232353235363131313335323132376165633537386163613238636338 May 13 08:42:12.034000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.034000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.034000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.034000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.034000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.034000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.034000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.034000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.034000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.034000 audit: BPF prog-id=57 op=LOAD May 13 08:42:12.034000 audit[1581]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000358838 items=0 ppid=1557 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:12.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.035000 audit: BPF prog-id=58 op=LOAD May 13 08:42:12.036000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1576 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:12.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062666561373566653637373430343934343139643363373566383766 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1576 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:12.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062666561373566653637373430343934343139643363373566383766 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit: BPF prog-id=59 op=LOAD May 13 08:42:12.036000 audit[1596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c8d20 items=0 ppid=1576 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:12.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062666561373566653637373430343934343139643363373566383766 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit: BPF prog-id=60 op=LOAD May 13 08:42:12.036000 audit[1596]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c8d68 items=0 ppid=1576 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:12.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062666561373566653637373430343934343139643363373566383766 May 13 08:42:12.036000 audit: BPF prog-id=60 op=UNLOAD May 13 08:42:12.036000 audit: BPF prog-id=59 op=UNLOAD May 13 08:42:12.036000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.036000 audit: BPF prog-id=61 op=LOAD May 13 08:42:12.036000 audit[1596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c9178 items=0 ppid=1576 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:12.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062666561373566653637373430343934343139643363373566383766 May 13 08:42:12.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232353235363131313335323132376165633537386163613238636338 May 13 08:42:12.039000 audit: BPF prog-id=57 op=UNLOAD May 13 08:42:12.039000 audit: BPF prog-id=56 op=UNLOAD May 13 08:42:12.039000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.039000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.039000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.039000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.039000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.039000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.039000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.039000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.039000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.039000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:12.039000 audit: BPF prog-id=62 op=LOAD May 13 08:42:12.039000 audit[1581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000358c48 items=0 ppid=1557 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:12.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232353235363131313335323132376165633537386163613238636338 May 13 08:42:12.060128 env[1147]: time="2025-05-13T08:42:12.060078058Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gs6lw,Uid:b5a9f865-0c8e-44e3-b818-cf221f71b0d7,Namespace:calico-system,Attempt:0,} returns sandbox id \"0bfea75fe67740494419d3c75f87f1184970c0343d7667cfde536b6058914498\"" May 13 08:42:12.065435 env[1147]: time="2025-05-13T08:42:12.065387338Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-67s4h,Uid:8265462a-8f92-456d-acc1-8cbad7535c17,Namespace:kube-system,Attempt:0,} returns sandbox id \"b25256111352127aec578aca28cc88d98f05b1d399310de27b2c83671b9867e4\"" May 13 08:42:12.065681 env[1147]: time="2025-05-13T08:42:12.065424185Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 13 08:42:12.763630 kubelet[1454]: E0513 08:42:12.763574 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:13.764708 kubelet[1454]: E0513 08:42:13.764613 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:14.024394 kubelet[1454]: E0513 08:42:14.024075 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-g84xq" podUID="1844c58a-5bb2-45ae-9956-e2c503a474fa" May 13 08:42:14.178525 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3097992678.mount: Deactivated successfully. May 13 08:42:14.383403 env[1147]: time="2025-05-13T08:42:14.383166921Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:14.387342 env[1147]: time="2025-05-13T08:42:14.387318654Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:14.391683 env[1147]: time="2025-05-13T08:42:14.391663150Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:14.394632 env[1147]: time="2025-05-13T08:42:14.394610552Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:14.396076 env[1147]: time="2025-05-13T08:42:14.396002318Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 13 08:42:14.398594 env[1147]: time="2025-05-13T08:42:14.398533876Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 13 08:42:14.399750 env[1147]: time="2025-05-13T08:42:14.399718802Z" level=info msg="CreateContainer within sandbox \"0bfea75fe67740494419d3c75f87f1184970c0343d7667cfde536b6058914498\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 13 08:42:14.416647 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3371047326.mount: Deactivated successfully. May 13 08:42:14.429372 env[1147]: time="2025-05-13T08:42:14.429335972Z" level=info msg="CreateContainer within sandbox \"0bfea75fe67740494419d3c75f87f1184970c0343d7667cfde536b6058914498\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"5e3728bc35504f1ebc3ce007f40680d38a6e6106cdf371ec854fc48c82d6ef09\"" May 13 08:42:14.430403 env[1147]: time="2025-05-13T08:42:14.430378437Z" level=info msg="StartContainer for \"5e3728bc35504f1ebc3ce007f40680d38a6e6106cdf371ec854fc48c82d6ef09\"" May 13 08:42:14.458833 systemd[1]: Started cri-containerd-5e3728bc35504f1ebc3ce007f40680d38a6e6106cdf371ec854fc48c82d6ef09.scope. May 13 08:42:14.487000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f05ea1c2da8 items=0 ppid=1576 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:14.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565333732386263333535303466316562633363653030376634303638 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit: BPF prog-id=63 op=LOAD May 13 08:42:14.487000 audit[1639]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003607f8 items=0 ppid=1576 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:14.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565333732386263333535303466316562633363653030376634303638 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit: BPF prog-id=64 op=LOAD May 13 08:42:14.487000 audit[1639]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000360848 items=0 ppid=1576 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:14.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565333732386263333535303466316562633363653030376634303638 May 13 08:42:14.487000 audit: BPF prog-id=64 op=UNLOAD May 13 08:42:14.487000 audit: BPF prog-id=63 op=UNLOAD May 13 08:42:14.487000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:14.487000 audit: BPF prog-id=65 op=LOAD May 13 08:42:14.487000 audit[1639]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003608d8 items=0 ppid=1576 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:14.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565333732386263333535303466316562633363653030376634303638 May 13 08:42:14.512668 systemd[1]: cri-containerd-5e3728bc35504f1ebc3ce007f40680d38a6e6106cdf371ec854fc48c82d6ef09.scope: Deactivated successfully. May 13 08:42:14.514647 env[1147]: time="2025-05-13T08:42:14.513878693Z" level=info msg="StartContainer for \"5e3728bc35504f1ebc3ce007f40680d38a6e6106cdf371ec854fc48c82d6ef09\" returns successfully" May 13 08:42:14.515000 audit: BPF prog-id=65 op=UNLOAD May 13 08:42:14.738956 env[1147]: time="2025-05-13T08:42:14.738870134Z" level=info msg="shim disconnected" id=5e3728bc35504f1ebc3ce007f40680d38a6e6106cdf371ec854fc48c82d6ef09 May 13 08:42:14.739467 env[1147]: time="2025-05-13T08:42:14.739421156Z" level=warning msg="cleaning up after shim disconnected" id=5e3728bc35504f1ebc3ce007f40680d38a6e6106cdf371ec854fc48c82d6ef09 namespace=k8s.io May 13 08:42:14.739687 env[1147]: time="2025-05-13T08:42:14.739614160Z" level=info msg="cleaning up dead shim" May 13 08:42:14.764281 env[1147]: time="2025-05-13T08:42:14.764218446Z" level=warning msg="cleanup warnings time=\"2025-05-13T08:42:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1681 runtime=io.containerd.runc.v2\n" May 13 08:42:14.765714 kubelet[1454]: E0513 08:42:14.765611 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:14.797953 update_engine[1144]: I0513 08:42:14.797343 1144 update_attempter.cc:509] Updating boot flags... May 13 08:42:15.114922 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5e3728bc35504f1ebc3ce007f40680d38a6e6106cdf371ec854fc48c82d6ef09-rootfs.mount: Deactivated successfully. May 13 08:42:15.766459 kubelet[1454]: E0513 08:42:15.766322 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:16.022658 kubelet[1454]: E0513 08:42:16.020762 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-g84xq" podUID="1844c58a-5bb2-45ae-9956-e2c503a474fa" May 13 08:42:16.096024 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1732569224.mount: Deactivated successfully. May 13 08:42:16.767426 kubelet[1454]: E0513 08:42:16.767302 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:17.030651 env[1147]: time="2025-05-13T08:42:17.030187125Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:17.034019 env[1147]: time="2025-05-13T08:42:17.033961631Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:17.036015 env[1147]: time="2025-05-13T08:42:17.035962308Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:17.037818 env[1147]: time="2025-05-13T08:42:17.037755013Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:17.038368 env[1147]: time="2025-05-13T08:42:17.038318852Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2\"" May 13 08:42:17.041840 env[1147]: time="2025-05-13T08:42:17.041297161Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 13 08:42:17.044681 env[1147]: time="2025-05-13T08:42:17.044616469Z" level=info msg="CreateContainer within sandbox \"b25256111352127aec578aca28cc88d98f05b1d399310de27b2c83671b9867e4\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 13 08:42:17.065635 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount282359313.mount: Deactivated successfully. May 13 08:42:17.071603 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1145157576.mount: Deactivated successfully. May 13 08:42:17.079495 env[1147]: time="2025-05-13T08:42:17.079457673Z" level=info msg="CreateContainer within sandbox \"b25256111352127aec578aca28cc88d98f05b1d399310de27b2c83671b9867e4\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"89a985d884a8417b976b84e5b7c1e66fb45f7d3006df31400ef715fdf824e4c3\"" May 13 08:42:17.080596 env[1147]: time="2025-05-13T08:42:17.080569322Z" level=info msg="StartContainer for \"89a985d884a8417b976b84e5b7c1e66fb45f7d3006df31400ef715fdf824e4c3\"" May 13 08:42:17.109362 systemd[1]: Started cri-containerd-89a985d884a8417b976b84e5b7c1e66fb45f7d3006df31400ef715fdf824e4c3.scope. May 13 08:42:17.137000 audit[1723]: AVC avc: denied { perfmon } for pid=1723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.142811 kernel: kauditd_printk_skb: 201 callbacks suppressed May 13 08:42:17.142934 kernel: audit: type=1400 audit(1747125737.137:433): avc: denied { perfmon } for pid=1723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.137000 audit[1723]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1cd8ee39a8 items=0 ppid=1557 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839613938356438383461383431376239373662383465356237633165 May 13 08:42:17.174926 kernel: audit: type=1300 audit(1747125737.137:433): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1cd8ee39a8 items=0 ppid=1557 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.180920 kernel: audit: type=1327 audit(1747125737.137:433): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839613938356438383461383431376239373662383465356237633165 May 13 08:42:17.180947 kernel: audit: type=1400 audit(1747125737.137:434): avc: denied { bpf } for pid=1723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.180974 kernel: audit: type=1400 audit(1747125737.137:434): avc: denied { bpf } for pid=1723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.137000 audit[1723]: AVC avc: denied { bpf } for pid=1723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.137000 audit[1723]: AVC avc: denied { bpf } for pid=1723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.137000 audit[1723]: AVC avc: denied { bpf } for pid=1723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.192797 kernel: audit: type=1400 audit(1747125737.137:434): avc: denied { bpf } for pid=1723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.137000 audit[1723]: AVC avc: denied { perfmon } for pid=1723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.199003 kernel: audit: type=1400 audit(1747125737.137:434): avc: denied { perfmon } for pid=1723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.137000 audit[1723]: AVC avc: denied { perfmon } for pid=1723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.205327 kernel: audit: type=1400 audit(1747125737.137:434): avc: denied { perfmon } for pid=1723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.137000 audit[1723]: AVC avc: denied { perfmon } for pid=1723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.137000 audit[1723]: AVC avc: denied { perfmon } for pid=1723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.217910 kernel: audit: type=1400 audit(1747125737.137:434): avc: denied { perfmon } for pid=1723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.218017 kernel: audit: type=1400 audit(1747125737.137:434): avc: denied { perfmon } for pid=1723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.137000 audit[1723]: AVC avc: denied { perfmon } for pid=1723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.137000 audit[1723]: AVC avc: denied { bpf } for pid=1723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.137000 audit[1723]: AVC avc: denied { bpf } for pid=1723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.137000 audit: BPF prog-id=66 op=LOAD May 13 08:42:17.137000 audit[1723]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002d7ba8 items=0 ppid=1557 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839613938356438383461383431376239373662383465356237633165 May 13 08:42:17.155000 audit[1723]: AVC avc: denied { bpf } for pid=1723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.155000 audit[1723]: AVC avc: denied { bpf } for pid=1723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.155000 audit[1723]: AVC avc: denied { perfmon } for pid=1723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.155000 audit[1723]: AVC avc: denied { perfmon } for pid=1723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.155000 audit[1723]: AVC avc: denied { perfmon } for pid=1723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.155000 audit[1723]: AVC avc: denied { perfmon } for pid=1723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.155000 audit[1723]: AVC avc: denied { perfmon } for pid=1723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.155000 audit[1723]: AVC avc: denied { bpf } for pid=1723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.155000 audit[1723]: AVC avc: denied { bpf } for pid=1723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.155000 audit: BPF prog-id=67 op=LOAD May 13 08:42:17.155000 audit[1723]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00009a6c8 items=0 ppid=1557 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839613938356438383461383431376239373662383465356237633165 May 13 08:42:17.155000 audit: BPF prog-id=67 op=UNLOAD May 13 08:42:17.155000 audit: BPF prog-id=66 op=UNLOAD May 13 08:42:17.155000 audit[1723]: AVC avc: denied { bpf } for pid=1723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.155000 audit[1723]: AVC avc: denied { bpf } for pid=1723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.155000 audit[1723]: AVC avc: denied { bpf } for pid=1723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.155000 audit[1723]: AVC avc: denied { perfmon } for pid=1723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.155000 audit[1723]: AVC avc: denied { perfmon } for pid=1723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.155000 audit[1723]: AVC avc: denied { perfmon } for pid=1723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.155000 audit[1723]: AVC avc: denied { perfmon } for pid=1723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.155000 audit[1723]: AVC avc: denied { perfmon } for pid=1723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.155000 audit[1723]: AVC avc: denied { bpf } for pid=1723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.155000 audit[1723]: AVC avc: denied { bpf } for pid=1723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:17.155000 audit: BPF prog-id=68 op=LOAD May 13 08:42:17.155000 audit[1723]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00009a758 items=0 ppid=1557 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839613938356438383461383431376239373662383465356237633165 May 13 08:42:17.223781 env[1147]: time="2025-05-13T08:42:17.223741014Z" level=info msg="StartContainer for \"89a985d884a8417b976b84e5b7c1e66fb45f7d3006df31400ef715fdf824e4c3\" returns successfully" May 13 08:42:17.346000 audit[1784]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.346000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc85f36020 a2=0 a3=7ffc85f3600c items=0 ppid=1734 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.346000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 08:42:17.351000 audit[1783]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:17.351000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf71a1ea0 a2=0 a3=7ffcf71a1e8c items=0 ppid=1734 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.351000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 13 08:42:17.353000 audit[1786]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.353000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcabe224c0 a2=0 a3=7ffcabe224ac items=0 ppid=1734 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.353000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 08:42:17.355000 audit[1788]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:17.355000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe682029c0 a2=0 a3=7ffe682029ac items=0 ppid=1734 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.355000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 13 08:42:17.355000 audit[1787]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=1787 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.355000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf346f650 a2=0 a3=7ffcf346f63c items=0 ppid=1734 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.355000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 08:42:17.358000 audit[1789]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:17.358000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff283627e0 a2=0 a3=7fff283627cc items=0 ppid=1734 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.358000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 13 08:42:17.452000 audit[1790]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:17.452000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd19dac720 a2=0 a3=7ffd19dac70c items=0 ppid=1734 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.452000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 08:42:17.458000 audit[1792]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:17.458000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff828f38a0 a2=0 a3=7fff828f388c items=0 ppid=1734 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.458000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 13 08:42:17.466000 audit[1795]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:17.466000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff4c4c3e40 a2=0 a3=7fff4c4c3e2c items=0 ppid=1734 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.466000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 13 08:42:17.469000 audit[1796]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:17.469000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9e6a1e20 a2=0 a3=7ffe9e6a1e0c items=0 ppid=1734 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.469000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 08:42:17.474000 audit[1798]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:17.474000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff51610c80 a2=0 a3=7fff51610c6c items=0 ppid=1734 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.474000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 08:42:17.477000 audit[1799]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:17.477000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe554340b0 a2=0 a3=7ffe5543409c items=0 ppid=1734 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.477000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 08:42:17.484000 audit[1801]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1801 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:17.484000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdeeda6ba0 a2=0 a3=7ffdeeda6b8c items=0 ppid=1734 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.484000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 08:42:17.491000 audit[1804]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1804 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:17.491000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffca00f75d0 a2=0 a3=7ffca00f75bc items=0 ppid=1734 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.491000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 13 08:42:17.494000 audit[1805]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:17.494000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffccb223590 a2=0 a3=7ffccb22357c items=0 ppid=1734 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.494000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 08:42:17.501000 audit[1807]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:17.501000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffe48bd080 a2=0 a3=7fffe48bd06c items=0 ppid=1734 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.501000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 08:42:17.504000 audit[1808]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:17.504000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3b7712c0 a2=0 a3=7fff3b7712ac items=0 ppid=1734 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.504000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 08:42:17.511000 audit[1810]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1810 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:17.511000 audit[1810]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffff09c410 a2=0 a3=7fffff09c3fc items=0 ppid=1734 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.511000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 08:42:17.521000 audit[1813]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1813 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:17.521000 audit[1813]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdeb3ec130 a2=0 a3=7ffdeb3ec11c items=0 ppid=1734 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.521000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 08:42:17.530000 audit[1816]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:17.530000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdbbe29ee0 a2=0 a3=7ffdbbe29ecc items=0 ppid=1734 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.530000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 08:42:17.533000 audit[1817]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1817 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:17.533000 audit[1817]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe0e0ca9b0 a2=0 a3=7ffe0e0ca99c items=0 ppid=1734 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.533000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 08:42:17.539000 audit[1819]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1819 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:17.539000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd11dad0f0 a2=0 a3=7ffd11dad0dc items=0 ppid=1734 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.539000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 08:42:17.590000 audit[1823]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:17.590000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe210b75b0 a2=0 a3=7ffe210b759c items=0 ppid=1734 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.590000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 08:42:17.592000 audit[1824]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:17.592000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec57784b0 a2=0 a3=7ffec577849c items=0 ppid=1734 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.592000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 08:42:17.596000 audit[1826]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1826 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 13 08:42:17.596000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc141c38d0 a2=0 a3=7ffc141c38bc items=0 ppid=1734 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.596000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 08:42:17.626000 audit[1832]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1832 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:42:17.626000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc942c0ee0 a2=0 a3=7ffc942c0ecc items=0 ppid=1734 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.626000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:42:17.665000 audit[1832]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:42:17.665000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffc942c0ee0 a2=0 a3=7ffc942c0ecc items=0 ppid=1734 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.665000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:42:17.697000 audit[1841]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.697000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc1f1ea7b0 a2=0 a3=7ffc1f1ea79c items=0 ppid=1734 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.697000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 13 08:42:17.710000 audit[1843]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1843 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.710000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff85330250 a2=0 a3=7fff8533023c items=0 ppid=1734 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.710000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 13 08:42:17.719000 audit[1846]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1846 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.719000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd79ba7ae0 a2=0 a3=7ffd79ba7acc items=0 ppid=1734 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.719000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 13 08:42:17.721000 audit[1847]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1847 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.721000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff95fe9fd0 a2=0 a3=7fff95fe9fbc items=0 ppid=1734 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.721000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 13 08:42:17.727000 audit[1849]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1849 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.727000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc82ad8a60 a2=0 a3=7ffc82ad8a4c items=0 ppid=1734 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.727000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 13 08:42:17.729000 audit[1850]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1850 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.729000 audit[1850]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe6d13610 a2=0 a3=7fffe6d135fc items=0 ppid=1734 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.729000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 13 08:42:17.735000 audit[1852]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1852 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.735000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe906fdef0 a2=0 a3=7ffe906fdedc items=0 ppid=1734 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.735000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 13 08:42:17.739000 audit[1855]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1855 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.739000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd873e23d0 a2=0 a3=7ffd873e23bc items=0 ppid=1734 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.739000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 13 08:42:17.740000 audit[1856]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1856 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.740000 audit[1856]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffecd462210 a2=0 a3=7ffecd4621fc items=0 ppid=1734 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.740000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 13 08:42:17.744000 audit[1858]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1858 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.744000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff07a0f390 a2=0 a3=7fff07a0f37c items=0 ppid=1734 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.744000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 13 08:42:17.745000 audit[1859]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1859 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.745000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcffec6760 a2=0 a3=7ffcffec674c items=0 ppid=1734 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.745000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 13 08:42:17.749000 audit[1861]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1861 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.749000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffbebc4160 a2=0 a3=7fffbebc414c items=0 ppid=1734 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.749000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 13 08:42:17.753000 audit[1864]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1864 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.753000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe0e54b7e0 a2=0 a3=7ffe0e54b7cc items=0 ppid=1734 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 13 08:42:17.757000 audit[1867]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1867 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.757000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb5893590 a2=0 a3=7ffdb589357c items=0 ppid=1734 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.757000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 13 08:42:17.758000 audit[1868]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1868 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.758000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc237e3ee0 a2=0 a3=7ffc237e3ecc items=0 ppid=1734 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.758000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 13 08:42:17.762000 audit[1870]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1870 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.762000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff1b0b6990 a2=0 a3=7fff1b0b697c items=0 ppid=1734 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.762000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 08:42:17.768982 kubelet[1454]: E0513 08:42:17.768880 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:17.771000 audit[1873]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1873 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.771000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffb4e96cc0 a2=0 a3=7fffb4e96cac items=0 ppid=1734 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.771000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 13 08:42:17.774000 audit[1874]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1874 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.774000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcbbc000e0 a2=0 a3=7ffcbbc000cc items=0 ppid=1734 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.774000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 13 08:42:17.777000 audit[1876]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1876 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.777000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd0673daf0 a2=0 a3=7ffd0673dadc items=0 ppid=1734 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.777000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 13 08:42:17.778000 audit[1877]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1877 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.778000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf13c7f90 a2=0 a3=7ffdf13c7f7c items=0 ppid=1734 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.778000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 13 08:42:17.783000 audit[1879]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1879 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.783000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc8a9d0f30 a2=0 a3=7ffc8a9d0f1c items=0 ppid=1734 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.783000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 08:42:17.788000 audit[1882]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1882 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 13 08:42:17.788000 audit[1882]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc5bf4ae60 a2=0 a3=7ffc5bf4ae4c items=0 ppid=1734 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.788000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 13 08:42:17.792000 audit[1884]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1884 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 08:42:17.792000 audit[1884]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffd4676aa00 a2=0 a3=7ffd4676a9ec items=0 ppid=1734 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.792000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:42:17.792000 audit[1884]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1884 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 13 08:42:17.792000 audit[1884]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd4676aa00 a2=0 a3=7ffd4676a9ec items=0 ppid=1734 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:17.792000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:42:18.023079 kubelet[1454]: E0513 08:42:18.022945 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-g84xq" podUID="1844c58a-5bb2-45ae-9956-e2c503a474fa" May 13 08:42:18.129057 kubelet[1454]: I0513 08:42:18.128872 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-67s4h" podStartSLOduration=3.15510441 podStartE2EDuration="8.128839164s" podCreationTimestamp="2025-05-13 08:42:10 +0000 UTC" firstStartedPulling="2025-05-13 08:42:12.066948336 +0000 UTC m=+3.021546820" lastFinishedPulling="2025-05-13 08:42:17.040683039 +0000 UTC m=+7.995281574" observedRunningTime="2025-05-13 08:42:18.126570488 +0000 UTC m=+9.081169062" watchObservedRunningTime="2025-05-13 08:42:18.128839164 +0000 UTC m=+9.083437688" May 13 08:42:18.769831 kubelet[1454]: E0513 08:42:18.769738 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:19.770936 kubelet[1454]: E0513 08:42:19.770889 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:20.025668 kubelet[1454]: E0513 08:42:20.022249 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-g84xq" podUID="1844c58a-5bb2-45ae-9956-e2c503a474fa" May 13 08:42:20.771918 kubelet[1454]: E0513 08:42:20.771746 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:21.772190 kubelet[1454]: E0513 08:42:21.772141 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:22.021917 kubelet[1454]: E0513 08:42:22.021855 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-g84xq" podUID="1844c58a-5bb2-45ae-9956-e2c503a474fa" May 13 08:42:22.772429 kubelet[1454]: E0513 08:42:22.772367 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:23.774020 kubelet[1454]: E0513 08:42:23.773277 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:24.023741 kubelet[1454]: E0513 08:42:24.023656 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-g84xq" podUID="1844c58a-5bb2-45ae-9956-e2c503a474fa" May 13 08:42:24.535402 env[1147]: time="2025-05-13T08:42:24.535298225Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:24.537988 env[1147]: time="2025-05-13T08:42:24.537929045Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:24.540289 env[1147]: time="2025-05-13T08:42:24.540239621Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:24.542504 env[1147]: time="2025-05-13T08:42:24.542454389Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:24.543258 env[1147]: time="2025-05-13T08:42:24.543221974Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 13 08:42:24.550653 env[1147]: time="2025-05-13T08:42:24.550601902Z" level=info msg="CreateContainer within sandbox \"0bfea75fe67740494419d3c75f87f1184970c0343d7667cfde536b6058914498\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 13 08:42:24.579619 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3477304766.mount: Deactivated successfully. May 13 08:42:24.592184 env[1147]: time="2025-05-13T08:42:24.592149997Z" level=info msg="CreateContainer within sandbox \"0bfea75fe67740494419d3c75f87f1184970c0343d7667cfde536b6058914498\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"d0ff8fdf63a99178c4b7cedfec1365e22bdd30f38e57689cf1af053f29c5eb8e\"" May 13 08:42:24.593042 env[1147]: time="2025-05-13T08:42:24.593020381Z" level=info msg="StartContainer for \"d0ff8fdf63a99178c4b7cedfec1365e22bdd30f38e57689cf1af053f29c5eb8e\"" May 13 08:42:24.629719 systemd[1]: Started cri-containerd-d0ff8fdf63a99178c4b7cedfec1365e22bdd30f38e57689cf1af053f29c5eb8e.scope. May 13 08:42:24.671393 kernel: kauditd_printk_skb: 186 callbacks suppressed May 13 08:42:24.671477 kernel: audit: type=1400 audit(1747125744.664:490): avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.664000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.664000 audit[1892]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fec40e33ba8 items=0 ppid=1576 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:24.679196 kernel: audit: type=1300 audit(1747125744.664:490): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fec40e33ba8 items=0 ppid=1576 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:24.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430666638666466363361393931373863346237636564666563313336 May 13 08:42:24.686149 kernel: audit: type=1327 audit(1747125744.664:490): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430666638666466363361393931373863346237636564666563313336 May 13 08:42:24.664000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.691475 kernel: audit: type=1400 audit(1747125744.664:491): avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.703588 kernel: audit: type=1400 audit(1747125744.664:491): avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.703641 kernel: audit: type=1400 audit(1747125744.664:491): avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.664000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.664000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.664000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.716584 kernel: audit: type=1400 audit(1747125744.664:491): avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.716638 kernel: audit: type=1400 audit(1747125744.664:491): avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.664000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.723292 kernel: audit: type=1400 audit(1747125744.664:491): avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.664000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.729716 kernel: audit: type=1400 audit(1747125744.664:491): avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.664000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.729814 env[1147]: time="2025-05-13T08:42:24.724164393Z" level=info msg="StartContainer for \"d0ff8fdf63a99178c4b7cedfec1365e22bdd30f38e57689cf1af053f29c5eb8e\" returns successfully" May 13 08:42:24.664000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.664000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.664000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.664000 audit: BPF prog-id=69 op=LOAD May 13 08:42:24.664000 audit[1892]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000408208 items=0 ppid=1576 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:24.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430666638666466363361393931373863346237636564666563313336 May 13 08:42:24.670000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.670000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.670000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.670000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.670000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.670000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.670000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.670000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.670000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.670000 audit: BPF prog-id=70 op=LOAD May 13 08:42:24.670000 audit[1892]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000408258 items=0 ppid=1576 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:24.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430666638666466363361393931373863346237636564666563313336 May 13 08:42:24.670000 audit: BPF prog-id=70 op=UNLOAD May 13 08:42:24.670000 audit: BPF prog-id=69 op=UNLOAD May 13 08:42:24.670000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.670000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.670000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.670000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.670000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.670000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.670000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.670000 audit[1892]: AVC avc: denied { perfmon } for pid=1892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.670000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.670000 audit[1892]: AVC avc: denied { bpf } for pid=1892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:24.670000 audit: BPF prog-id=71 op=LOAD May 13 08:42:24.670000 audit[1892]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0004082e8 items=0 ppid=1576 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:24.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430666638666466363361393931373863346237636564666563313336 May 13 08:42:24.774673 kubelet[1454]: E0513 08:42:24.774173 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:25.774516 kubelet[1454]: E0513 08:42:25.774371 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:26.021450 kubelet[1454]: E0513 08:42:26.021409 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-g84xq" podUID="1844c58a-5bb2-45ae-9956-e2c503a474fa" May 13 08:42:26.253153 env[1147]: time="2025-05-13T08:42:26.252878685Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 13 08:42:26.259841 systemd[1]: cri-containerd-d0ff8fdf63a99178c4b7cedfec1365e22bdd30f38e57689cf1af053f29c5eb8e.scope: Deactivated successfully. May 13 08:42:26.263000 audit: BPF prog-id=71 op=UNLOAD May 13 08:42:26.310346 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d0ff8fdf63a99178c4b7cedfec1365e22bdd30f38e57689cf1af053f29c5eb8e-rootfs.mount: Deactivated successfully. May 13 08:42:26.350854 kubelet[1454]: I0513 08:42:26.348844 1454 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 13 08:42:26.774742 kubelet[1454]: E0513 08:42:26.774659 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:27.038873 env[1147]: time="2025-05-13T08:42:27.038553548Z" level=info msg="shim disconnected" id=d0ff8fdf63a99178c4b7cedfec1365e22bdd30f38e57689cf1af053f29c5eb8e May 13 08:42:27.038873 env[1147]: time="2025-05-13T08:42:27.038684802Z" level=warning msg="cleaning up after shim disconnected" id=d0ff8fdf63a99178c4b7cedfec1365e22bdd30f38e57689cf1af053f29c5eb8e namespace=k8s.io May 13 08:42:27.038873 env[1147]: time="2025-05-13T08:42:27.038721249Z" level=info msg="cleaning up dead shim" May 13 08:42:27.058522 env[1147]: time="2025-05-13T08:42:27.058396606Z" level=warning msg="cleanup warnings time=\"2025-05-13T08:42:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1931 runtime=io.containerd.runc.v2\n" May 13 08:42:27.130626 env[1147]: time="2025-05-13T08:42:27.130506190Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 13 08:42:27.775379 kubelet[1454]: E0513 08:42:27.775325 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:28.030809 systemd[1]: Created slice kubepods-besteffort-pod1844c58a_5bb2_45ae_9956_e2c503a474fa.slice. May 13 08:42:28.037508 env[1147]: time="2025-05-13T08:42:28.037411495Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-g84xq,Uid:1844c58a-5bb2-45ae-9956-e2c503a474fa,Namespace:calico-system,Attempt:0,}" May 13 08:42:28.182467 env[1147]: time="2025-05-13T08:42:28.182334508Z" level=error msg="Failed to destroy network for sandbox \"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:42:28.184106 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6-shm.mount: Deactivated successfully. May 13 08:42:28.186759 env[1147]: time="2025-05-13T08:42:28.186675369Z" level=error msg="encountered an error cleaning up failed sandbox \"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:42:28.186896 env[1147]: time="2025-05-13T08:42:28.186801804Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-g84xq,Uid:1844c58a-5bb2-45ae-9956-e2c503a474fa,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:42:28.187549 kubelet[1454]: E0513 08:42:28.187439 1454 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:42:28.187726 kubelet[1454]: E0513 08:42:28.187649 1454 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-g84xq" May 13 08:42:28.187819 kubelet[1454]: E0513 08:42:28.187745 1454 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-g84xq" May 13 08:42:28.188189 kubelet[1454]: E0513 08:42:28.187933 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-g84xq_calico-system(1844c58a-5bb2-45ae-9956-e2c503a474fa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-g84xq_calico-system(1844c58a-5bb2-45ae-9956-e2c503a474fa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-g84xq" podUID="1844c58a-5bb2-45ae-9956-e2c503a474fa" May 13 08:42:28.577785 systemd[1]: Created slice kubepods-besteffort-podee4b012b_938a_495d_8e41_e25ae4fa74a1.slice. May 13 08:42:28.668678 kubelet[1454]: I0513 08:42:28.668576 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qrfxl\" (UniqueName: \"kubernetes.io/projected/ee4b012b-938a-495d-8e41-e25ae4fa74a1-kube-api-access-qrfxl\") pod \"nginx-deployment-8587fbcb89-rkbvh\" (UID: \"ee4b012b-938a-495d-8e41-e25ae4fa74a1\") " pod="default/nginx-deployment-8587fbcb89-rkbvh" May 13 08:42:28.777278 kubelet[1454]: E0513 08:42:28.777220 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:28.885371 env[1147]: time="2025-05-13T08:42:28.884816360Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-rkbvh,Uid:ee4b012b-938a-495d-8e41-e25ae4fa74a1,Namespace:default,Attempt:0,}" May 13 08:42:29.058412 env[1147]: time="2025-05-13T08:42:29.058291407Z" level=error msg="Failed to destroy network for sandbox \"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:42:29.062559 env[1147]: time="2025-05-13T08:42:29.059891364Z" level=error msg="encountered an error cleaning up failed sandbox \"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:42:29.062559 env[1147]: time="2025-05-13T08:42:29.059943541Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-rkbvh,Uid:ee4b012b-938a-495d-8e41-e25ae4fa74a1,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:42:29.062694 kubelet[1454]: E0513 08:42:29.061839 1454 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:42:29.062694 kubelet[1454]: E0513 08:42:29.061895 1454 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-rkbvh" May 13 08:42:29.062694 kubelet[1454]: E0513 08:42:29.061918 1454 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-rkbvh" May 13 08:42:29.060514 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81-shm.mount: Deactivated successfully. May 13 08:42:29.062994 kubelet[1454]: E0513 08:42:29.061968 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-rkbvh_default(ee4b012b-938a-495d-8e41-e25ae4fa74a1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-rkbvh_default(ee4b012b-938a-495d-8e41-e25ae4fa74a1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-rkbvh" podUID="ee4b012b-938a-495d-8e41-e25ae4fa74a1" May 13 08:42:29.132099 kubelet[1454]: I0513 08:42:29.131535 1454 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" May 13 08:42:29.132280 env[1147]: time="2025-05-13T08:42:29.132245111Z" level=info msg="StopPodSandbox for \"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81\"" May 13 08:42:29.152472 kubelet[1454]: I0513 08:42:29.151296 1454 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" May 13 08:42:29.152813 env[1147]: time="2025-05-13T08:42:29.152782792Z" level=info msg="StopPodSandbox for \"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6\"" May 13 08:42:29.212640 env[1147]: time="2025-05-13T08:42:29.212568306Z" level=error msg="StopPodSandbox for \"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81\" failed" error="failed to destroy network for sandbox \"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:42:29.212789 env[1147]: time="2025-05-13T08:42:29.212764000Z" level=error msg="StopPodSandbox for \"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6\" failed" error="failed to destroy network for sandbox \"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 13 08:42:29.213368 kubelet[1454]: E0513 08:42:29.212978 1454 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" May 13 08:42:29.213368 kubelet[1454]: E0513 08:42:29.213053 1454 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6"} May 13 08:42:29.213368 kubelet[1454]: E0513 08:42:29.213153 1454 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1844c58a-5bb2-45ae-9956-e2c503a474fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 08:42:29.213368 kubelet[1454]: E0513 08:42:29.213197 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1844c58a-5bb2-45ae-9956-e2c503a474fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-g84xq" podUID="1844c58a-5bb2-45ae-9956-e2c503a474fa" May 13 08:42:29.213572 kubelet[1454]: E0513 08:42:29.213232 1454 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" May 13 08:42:29.213572 kubelet[1454]: E0513 08:42:29.213251 1454 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81"} May 13 08:42:29.213572 kubelet[1454]: E0513 08:42:29.213294 1454 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ee4b012b-938a-495d-8e41-e25ae4fa74a1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 13 08:42:29.213572 kubelet[1454]: E0513 08:42:29.213315 1454 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ee4b012b-938a-495d-8e41-e25ae4fa74a1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-rkbvh" podUID="ee4b012b-938a-495d-8e41-e25ae4fa74a1" May 13 08:42:29.751265 kubelet[1454]: E0513 08:42:29.751177 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:29.779174 kubelet[1454]: E0513 08:42:29.779073 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:30.779528 kubelet[1454]: E0513 08:42:30.779329 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:31.779806 kubelet[1454]: E0513 08:42:31.779669 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:32.780389 kubelet[1454]: E0513 08:42:32.780345 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:33.780820 kubelet[1454]: E0513 08:42:33.780723 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:34.781257 kubelet[1454]: E0513 08:42:34.781197 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:35.782003 kubelet[1454]: E0513 08:42:35.781940 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:36.782933 kubelet[1454]: E0513 08:42:36.782854 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:37.783690 kubelet[1454]: E0513 08:42:37.783629 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:37.811081 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount430422474.mount: Deactivated successfully. May 13 08:42:37.935635 env[1147]: time="2025-05-13T08:42:37.935513319Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:37.940601 env[1147]: time="2025-05-13T08:42:37.940462526Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:37.942965 env[1147]: time="2025-05-13T08:42:37.942903102Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:37.946051 env[1147]: time="2025-05-13T08:42:37.945999382Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:37.947304 env[1147]: time="2025-05-13T08:42:37.947191156Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 13 08:42:37.982612 env[1147]: time="2025-05-13T08:42:37.982534577Z" level=info msg="CreateContainer within sandbox \"0bfea75fe67740494419d3c75f87f1184970c0343d7667cfde536b6058914498\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 13 08:42:38.011873 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2200696232.mount: Deactivated successfully. May 13 08:42:38.027986 env[1147]: time="2025-05-13T08:42:38.027906122Z" level=info msg="CreateContainer within sandbox \"0bfea75fe67740494419d3c75f87f1184970c0343d7667cfde536b6058914498\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"35137ec69b9f248c6813546cc8a9025842e2f351749f4488f7dffffa52c1e622\"" May 13 08:42:38.029652 env[1147]: time="2025-05-13T08:42:38.029604412Z" level=info msg="StartContainer for \"35137ec69b9f248c6813546cc8a9025842e2f351749f4488f7dffffa52c1e622\"" May 13 08:42:38.071650 systemd[1]: Started cri-containerd-35137ec69b9f248c6813546cc8a9025842e2f351749f4488f7dffffa52c1e622.scope. May 13 08:42:38.117805 kernel: kauditd_printk_skb: 34 callbacks suppressed May 13 08:42:38.117953 kernel: audit: type=1400 audit(1747125758.110:497): avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.110000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.110000 audit[2065]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1c706d0448 items=0 ppid=1576 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:38.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335313337656336396239663234386336383133353436636338613930 May 13 08:42:38.136177 kernel: audit: type=1300 audit(1747125758.110:497): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1c706d0448 items=0 ppid=1576 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:38.136243 kernel: audit: type=1327 audit(1747125758.110:497): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335313337656336396239663234386336383133353436636338613930 May 13 08:42:38.110000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.141651 kernel: audit: type=1400 audit(1747125758.110:498): avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.110000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.155051 kernel: audit: type=1400 audit(1747125758.110:498): avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.155105 kernel: audit: type=1400 audit(1747125758.110:498): avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.110000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.110000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.165139 kernel: audit: type=1400 audit(1747125758.110:498): avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.165188 kernel: audit: type=1400 audit(1747125758.110:498): avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.165221 kernel: audit: type=1400 audit(1747125758.110:498): avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.110000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.110000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.110000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.176142 kernel: audit: type=1400 audit(1747125758.110:498): avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.110000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.110000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.110000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.110000 audit: BPF prog-id=72 op=LOAD May 13 08:42:38.110000 audit[2065]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00023df38 items=0 ppid=1576 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:38.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335313337656336396239663234386336383133353436636338613930 May 13 08:42:38.110000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.110000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.110000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.110000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.110000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.110000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.110000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.110000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.110000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.110000 audit: BPF prog-id=73 op=LOAD May 13 08:42:38.110000 audit[2065]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00023df88 items=0 ppid=1576 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:38.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335313337656336396239663234386336383133353436636338613930 May 13 08:42:38.117000 audit: BPF prog-id=73 op=UNLOAD May 13 08:42:38.117000 audit: BPF prog-id=72 op=UNLOAD May 13 08:42:38.117000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.117000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.117000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.117000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.117000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.117000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.117000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.117000 audit[2065]: AVC avc: denied { perfmon } for pid=2065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.117000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.117000 audit[2065]: AVC avc: denied { bpf } for pid=2065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:38.117000 audit: BPF prog-id=74 op=LOAD May 13 08:42:38.117000 audit[2065]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000338018 items=0 ppid=1576 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:38.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335313337656336396239663234386336383133353436636338613930 May 13 08:42:38.178337 env[1147]: time="2025-05-13T08:42:38.178309044Z" level=info msg="StartContainer for \"35137ec69b9f248c6813546cc8a9025842e2f351749f4488f7dffffa52c1e622\" returns successfully" May 13 08:42:38.262515 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 13 08:42:38.262626 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 13 08:42:38.784399 kubelet[1454]: E0513 08:42:38.784251 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:39.220877 kubelet[1454]: I0513 08:42:39.220744 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-gs6lw" podStartSLOduration=3.334624135 podStartE2EDuration="29.220672522s" podCreationTimestamp="2025-05-13 08:42:10 +0000 UTC" firstStartedPulling="2025-05-13 08:42:12.064155733 +0000 UTC m=+3.018754217" lastFinishedPulling="2025-05-13 08:42:37.95020407 +0000 UTC m=+28.904802604" observedRunningTime="2025-05-13 08:42:39.219579189 +0000 UTC m=+30.174177773" watchObservedRunningTime="2025-05-13 08:42:39.220672522 +0000 UTC m=+30.175271056" May 13 08:42:39.250583 systemd[1]: run-containerd-runc-k8s.io-35137ec69b9f248c6813546cc8a9025842e2f351749f4488f7dffffa52c1e622-runc.qFmJmX.mount: Deactivated successfully. May 13 08:42:39.785541 kubelet[1454]: E0513 08:42:39.785474 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:39.872000 audit[2183]: AVC avc: denied { write } for pid=2183 comm="tee" name="fd" dev="proc" ino=19682 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 08:42:39.873000 audit[2186]: AVC avc: denied { write } for pid=2186 comm="tee" name="fd" dev="proc" ino=19685 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 08:42:39.872000 audit[2183]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffa0802a13 a2=241 a3=1b6 items=1 ppid=2153 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:39.872000 audit: CWD cwd="/etc/service/enabled/felix/log" May 13 08:42:39.872000 audit: PATH item=0 name="/dev/fd/63" inode=19194 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:42:39.872000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 08:42:39.876000 audit[2194]: AVC avc: denied { write } for pid=2194 comm="tee" name="fd" dev="proc" ino=19695 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 08:42:39.873000 audit[2186]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe4b332a04 a2=241 a3=1b6 items=1 ppid=2152 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:39.873000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 13 08:42:39.873000 audit: PATH item=0 name="/dev/fd/63" inode=19676 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:42:39.873000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 08:42:39.876000 audit[2194]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc30066a15 a2=241 a3=1b6 items=1 ppid=2163 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:39.876000 audit: CWD cwd="/etc/service/enabled/cni/log" May 13 08:42:39.876000 audit: PATH item=0 name="/dev/fd/63" inode=19679 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:42:39.876000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 08:42:39.885000 audit[2209]: AVC avc: denied { write } for pid=2209 comm="tee" name="fd" dev="proc" ino=19702 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 08:42:39.888000 audit[2204]: AVC avc: denied { write } for pid=2204 comm="tee" name="fd" dev="proc" ino=19207 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 08:42:39.888000 audit[2204]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffefad55a13 a2=241 a3=1b6 items=1 ppid=2162 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:39.888000 audit: CWD cwd="/etc/service/enabled/confd/log" May 13 08:42:39.888000 audit: PATH item=0 name="/dev/fd/63" inode=19199 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:42:39.888000 audit[2207]: AVC avc: denied { write } for pid=2207 comm="tee" name="fd" dev="proc" ino=19209 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 08:42:39.888000 audit[2207]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf4647a14 a2=241 a3=1b6 items=1 ppid=2157 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:39.888000 audit: CWD cwd="/etc/service/enabled/bird/log" May 13 08:42:39.890000 audit[2211]: AVC avc: denied { write } for pid=2211 comm="tee" name="fd" dev="proc" ino=19705 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 13 08:42:39.888000 audit: PATH item=0 name="/dev/fd/63" inode=19688 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:42:39.888000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 08:42:39.888000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 08:42:39.885000 audit[2209]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4382ba03 a2=241 a3=1b6 items=1 ppid=2154 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:39.885000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 13 08:42:39.885000 audit: PATH item=0 name="/dev/fd/63" inode=19692 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:42:39.885000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 08:42:39.890000 audit[2211]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdcf2afa13 a2=241 a3=1b6 items=1 ppid=2160 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:39.890000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 13 08:42:39.890000 audit: PATH item=0 name="/dev/fd/63" inode=19200 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:42:39.890000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 13 08:42:40.022292 env[1147]: time="2025-05-13T08:42:40.022233762Z" level=info msg="StopPodSandbox for \"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6\"" May 13 08:42:40.148000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.148000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.148000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.148000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.148000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.148000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.148000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.148000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.148000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.148000 audit: BPF prog-id=75 op=LOAD May 13 08:42:40.148000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb5d06740 a2=98 a3=3 items=0 ppid=2155 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.148000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:42:40.148000 audit: BPF prog-id=75 op=UNLOAD May 13 08:42:40.149000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.149000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.149000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.149000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.149000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.149000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.149000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.149000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.149000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.149000 audit: BPF prog-id=76 op=LOAD May 13 08:42:40.149000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb5d06520 a2=74 a3=540051 items=0 ppid=2155 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.149000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:42:40.149000 audit: BPF prog-id=76 op=UNLOAD May 13 08:42:40.149000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.149000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.149000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.149000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.149000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.149000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.149000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.149000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.149000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.149000 audit: BPF prog-id=77 op=LOAD May 13 08:42:40.149000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb5d06550 a2=94 a3=2 items=0 ppid=2155 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.149000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:42:40.149000 audit: BPF prog-id=77 op=UNLOAD May 13 08:42:40.171088 env[1147]: 2025-05-13 08:42:40.111 [INFO][2246] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" May 13 08:42:40.171088 env[1147]: 2025-05-13 08:42:40.111 [INFO][2246] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" iface="eth0" netns="/var/run/netns/cni-f01b6060-64eb-7315-66aa-6b9a08aebec8" May 13 08:42:40.171088 env[1147]: 2025-05-13 08:42:40.112 [INFO][2246] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" iface="eth0" netns="/var/run/netns/cni-f01b6060-64eb-7315-66aa-6b9a08aebec8" May 13 08:42:40.171088 env[1147]: 2025-05-13 08:42:40.113 [INFO][2246] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" iface="eth0" netns="/var/run/netns/cni-f01b6060-64eb-7315-66aa-6b9a08aebec8" May 13 08:42:40.171088 env[1147]: 2025-05-13 08:42:40.114 [INFO][2246] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" May 13 08:42:40.171088 env[1147]: 2025-05-13 08:42:40.114 [INFO][2246] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" May 13 08:42:40.171088 env[1147]: 2025-05-13 08:42:40.156 [INFO][2262] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" HandleID="k8s-pod-network.2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" Workload="172.24.4.17-k8s-csi--node--driver--g84xq-eth0" May 13 08:42:40.171088 env[1147]: 2025-05-13 08:42:40.156 [INFO][2262] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:42:40.171088 env[1147]: 2025-05-13 08:42:40.156 [INFO][2262] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:42:40.171088 env[1147]: 2025-05-13 08:42:40.165 [WARNING][2262] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" HandleID="k8s-pod-network.2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" Workload="172.24.4.17-k8s-csi--node--driver--g84xq-eth0" May 13 08:42:40.171088 env[1147]: 2025-05-13 08:42:40.165 [INFO][2262] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" HandleID="k8s-pod-network.2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" Workload="172.24.4.17-k8s-csi--node--driver--g84xq-eth0" May 13 08:42:40.171088 env[1147]: 2025-05-13 08:42:40.167 [INFO][2262] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:42:40.171088 env[1147]: 2025-05-13 08:42:40.169 [INFO][2246] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" May 13 08:42:40.174726 env[1147]: time="2025-05-13T08:42:40.173041212Z" level=info msg="TearDown network for sandbox \"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6\" successfully" May 13 08:42:40.174726 env[1147]: time="2025-05-13T08:42:40.173083792Z" level=info msg="StopPodSandbox for \"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6\" returns successfully" May 13 08:42:40.173959 systemd[1]: run-netns-cni\x2df01b6060\x2d64eb\x2d7315\x2d66aa\x2d6b9a08aebec8.mount: Deactivated successfully. May 13 08:42:40.175280 env[1147]: time="2025-05-13T08:42:40.175253034Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-g84xq,Uid:1844c58a-5bb2-45ae-9956-e2c503a474fa,Namespace:calico-system,Attempt:1,}" May 13 08:42:40.330000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.330000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.330000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.330000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.330000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.330000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.330000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.330000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.330000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.330000 audit: BPF prog-id=78 op=LOAD May 13 08:42:40.330000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb5d06410 a2=40 a3=1 items=0 ppid=2155 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.330000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:42:40.331000 audit: BPF prog-id=78 op=UNLOAD May 13 08:42:40.331000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.331000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffeb5d064e0 a2=50 a3=7ffeb5d065c0 items=0 ppid=2155 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.331000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:42:40.341000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.341000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb5d06420 a2=28 a3=0 items=0 ppid=2155 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.341000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:42:40.342000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.342000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb5d06450 a2=28 a3=0 items=0 ppid=2155 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.342000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:42:40.342000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.342000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb5d06360 a2=28 a3=0 items=0 ppid=2155 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.342000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:42:40.342000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.342000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb5d06470 a2=28 a3=0 items=0 ppid=2155 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.342000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:42:40.342000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.342000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb5d06450 a2=28 a3=0 items=0 ppid=2155 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.342000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:42:40.342000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.342000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb5d06440 a2=28 a3=0 items=0 ppid=2155 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.342000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:42:40.343000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.343000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb5d06470 a2=28 a3=0 items=0 ppid=2155 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.343000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:42:40.343000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.343000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb5d06450 a2=28 a3=0 items=0 ppid=2155 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.343000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:42:40.343000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.343000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb5d06470 a2=28 a3=0 items=0 ppid=2155 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.343000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:42:40.343000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.343000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb5d06440 a2=28 a3=0 items=0 ppid=2155 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.343000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:42:40.343000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.343000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb5d064b0 a2=28 a3=0 items=0 ppid=2155 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.343000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:42:40.344000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.344000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeb5d06260 a2=50 a3=1 items=0 ppid=2155 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.344000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:42:40.344000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.344000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.344000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.344000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.344000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.344000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.344000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.344000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.344000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.344000 audit: BPF prog-id=79 op=LOAD May 13 08:42:40.344000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeb5d06260 a2=94 a3=5 items=0 ppid=2155 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.344000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:42:40.345000 audit: BPF prog-id=79 op=UNLOAD May 13 08:42:40.345000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.345000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeb5d06310 a2=50 a3=1 items=0 ppid=2155 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:42:40.345000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.345000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffeb5d06430 a2=4 a3=38 items=0 ppid=2155 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:42:40.345000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.345000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.345000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.345000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.345000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.345000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.345000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.345000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.345000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.345000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.345000 audit[2288]: AVC avc: denied { confidentiality } for pid=2288 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:42:40.345000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb5d06480 a2=94 a3=6 items=0 ppid=2155 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:42:40.346000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.346000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.346000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.346000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.346000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.346000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.346000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.346000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.346000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.346000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.346000 audit[2288]: AVC avc: denied { confidentiality } for pid=2288 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:42:40.346000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb5d05c30 a2=94 a3=83 items=0 ppid=2155 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.346000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:42:40.347000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.347000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.347000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.347000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.347000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.347000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.347000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.347000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.347000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.347000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.347000 audit[2288]: AVC avc: denied { confidentiality } for pid=2288 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:42:40.347000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb5d05c30 a2=94 a3=83 items=0 ppid=2155 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.347000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 13 08:42:40.355000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.355000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.355000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.355000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.355000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.355000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.355000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.355000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.355000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.355000 audit: BPF prog-id=80 op=LOAD May 13 08:42:40.355000 audit[2333]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffebe43ea10 a2=98 a3=1999999999999999 items=0 ppid=2155 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.355000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 08:42:40.356000 audit: BPF prog-id=80 op=UNLOAD May 13 08:42:40.356000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.356000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.356000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.356000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.356000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.356000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.356000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.356000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.356000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.356000 audit: BPF prog-id=81 op=LOAD May 13 08:42:40.356000 audit[2333]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffebe43e8f0 a2=74 a3=ffff items=0 ppid=2155 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.356000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 08:42:40.357000 audit: BPF prog-id=81 op=UNLOAD May 13 08:42:40.357000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.357000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.357000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.357000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.357000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.357000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.357000 audit[2333]: AVC avc: denied { perfmon } for pid=2333 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.357000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.357000 audit[2333]: AVC avc: denied { bpf } for pid=2333 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.357000 audit: BPF prog-id=82 op=LOAD May 13 08:42:40.357000 audit[2333]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffebe43e930 a2=40 a3=7ffebe43eb10 items=0 ppid=2155 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.357000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 13 08:42:40.358000 audit: BPF prog-id=82 op=UNLOAD May 13 08:42:40.467079 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 08:42:40.467183 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4e4d9121699: link becomes ready May 13 08:42:40.467407 systemd-networkd[991]: cali4e4d9121699: Link UP May 13 08:42:40.467625 systemd-networkd[991]: cali4e4d9121699: Gained carrier May 13 08:42:40.485361 systemd-networkd[991]: vxlan.calico: Link UP May 13 08:42:40.485521 systemd-networkd[991]: vxlan.calico: Gained carrier May 13 08:42:40.503393 env[1147]: 2025-05-13 08:42:40.294 [INFO][2307] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.17-k8s-csi--node--driver--g84xq-eth0 csi-node-driver- calico-system 1844c58a-5bb2-45ae-9956-e2c503a474fa 1432 0 2025-05-13 08:42:10 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5bcd8f69 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.24.4.17 csi-node-driver-g84xq eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali4e4d9121699 [] []}} ContainerID="64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9" Namespace="calico-system" Pod="csi-node-driver-g84xq" WorkloadEndpoint="172.24.4.17-k8s-csi--node--driver--g84xq-" May 13 08:42:40.503393 env[1147]: 2025-05-13 08:42:40.294 [INFO][2307] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9" Namespace="calico-system" Pod="csi-node-driver-g84xq" WorkloadEndpoint="172.24.4.17-k8s-csi--node--driver--g84xq-eth0" May 13 08:42:40.503393 env[1147]: 2025-05-13 08:42:40.337 [INFO][2325] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9" HandleID="k8s-pod-network.64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9" Workload="172.24.4.17-k8s-csi--node--driver--g84xq-eth0" May 13 08:42:40.503393 env[1147]: 2025-05-13 08:42:40.360 [INFO][2325] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9" HandleID="k8s-pod-network.64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9" Workload="172.24.4.17-k8s-csi--node--driver--g84xq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003133d0), Attrs:map[string]string{"namespace":"calico-system", "node":"172.24.4.17", "pod":"csi-node-driver-g84xq", "timestamp":"2025-05-13 08:42:40.337552182 +0000 UTC"}, Hostname:"172.24.4.17", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 08:42:40.503393 env[1147]: 2025-05-13 08:42:40.360 [INFO][2325] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:42:40.503393 env[1147]: 2025-05-13 08:42:40.360 [INFO][2325] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:42:40.503393 env[1147]: 2025-05-13 08:42:40.360 [INFO][2325] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.17' May 13 08:42:40.503393 env[1147]: 2025-05-13 08:42:40.369 [INFO][2325] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9" host="172.24.4.17" May 13 08:42:40.503393 env[1147]: 2025-05-13 08:42:40.376 [INFO][2325] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.17" May 13 08:42:40.503393 env[1147]: 2025-05-13 08:42:40.385 [INFO][2325] ipam/ipam.go 489: Trying affinity for 192.168.47.128/26 host="172.24.4.17" May 13 08:42:40.503393 env[1147]: 2025-05-13 08:42:40.390 [INFO][2325] ipam/ipam.go 155: Attempting to load block cidr=192.168.47.128/26 host="172.24.4.17" May 13 08:42:40.503393 env[1147]: 2025-05-13 08:42:40.397 [INFO][2325] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.47.128/26 host="172.24.4.17" May 13 08:42:40.503393 env[1147]: 2025-05-13 08:42:40.397 [INFO][2325] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.47.128/26 handle="k8s-pod-network.64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9" host="172.24.4.17" May 13 08:42:40.503393 env[1147]: 2025-05-13 08:42:40.401 [INFO][2325] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9 May 13 08:42:40.503393 env[1147]: 2025-05-13 08:42:40.414 [INFO][2325] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.47.128/26 handle="k8s-pod-network.64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9" host="172.24.4.17" May 13 08:42:40.503393 env[1147]: 2025-05-13 08:42:40.427 [INFO][2325] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.47.129/26] block=192.168.47.128/26 handle="k8s-pod-network.64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9" host="172.24.4.17" May 13 08:42:40.503393 env[1147]: 2025-05-13 08:42:40.427 [INFO][2325] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.47.129/26] handle="k8s-pod-network.64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9" host="172.24.4.17" May 13 08:42:40.503393 env[1147]: 2025-05-13 08:42:40.427 [INFO][2325] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:42:40.503393 env[1147]: 2025-05-13 08:42:40.428 [INFO][2325] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.47.129/26] IPv6=[] ContainerID="64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9" HandleID="k8s-pod-network.64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9" Workload="172.24.4.17-k8s-csi--node--driver--g84xq-eth0" May 13 08:42:40.504057 env[1147]: 2025-05-13 08:42:40.434 [INFO][2307] cni-plugin/k8s.go 386: Populated endpoint ContainerID="64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9" Namespace="calico-system" Pod="csi-node-driver-g84xq" WorkloadEndpoint="172.24.4.17-k8s-csi--node--driver--g84xq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.17-k8s-csi--node--driver--g84xq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1844c58a-5bb2-45ae-9956-e2c503a474fa", ResourceVersion:"1432", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 42, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.17", ContainerID:"", Pod:"csi-node-driver-g84xq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.47.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali4e4d9121699", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:42:40.504057 env[1147]: 2025-05-13 08:42:40.434 [INFO][2307] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.47.129/32] ContainerID="64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9" Namespace="calico-system" Pod="csi-node-driver-g84xq" WorkloadEndpoint="172.24.4.17-k8s-csi--node--driver--g84xq-eth0" May 13 08:42:40.504057 env[1147]: 2025-05-13 08:42:40.435 [INFO][2307] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4e4d9121699 ContainerID="64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9" Namespace="calico-system" Pod="csi-node-driver-g84xq" WorkloadEndpoint="172.24.4.17-k8s-csi--node--driver--g84xq-eth0" May 13 08:42:40.504057 env[1147]: 2025-05-13 08:42:40.466 [INFO][2307] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9" Namespace="calico-system" Pod="csi-node-driver-g84xq" WorkloadEndpoint="172.24.4.17-k8s-csi--node--driver--g84xq-eth0" May 13 08:42:40.504057 env[1147]: 2025-05-13 08:42:40.467 [INFO][2307] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9" Namespace="calico-system" Pod="csi-node-driver-g84xq" WorkloadEndpoint="172.24.4.17-k8s-csi--node--driver--g84xq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.17-k8s-csi--node--driver--g84xq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1844c58a-5bb2-45ae-9956-e2c503a474fa", ResourceVersion:"1432", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 42, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.17", ContainerID:"64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9", Pod:"csi-node-driver-g84xq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.47.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali4e4d9121699", MAC:"62:3a:79:29:a8:a1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:42:40.504057 env[1147]: 2025-05-13 08:42:40.497 [INFO][2307] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9" Namespace="calico-system" Pod="csi-node-driver-g84xq" WorkloadEndpoint="172.24.4.17-k8s-csi--node--driver--g84xq-eth0" May 13 08:42:40.521000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.521000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.521000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.521000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.521000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.521000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.521000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.521000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.521000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.521000 audit: BPF prog-id=83 op=LOAD May 13 08:42:40.521000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff69c14c30 a2=98 a3=ffff items=0 ppid=2155 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.521000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:42:40.521000 audit: BPF prog-id=83 op=UNLOAD May 13 08:42:40.522000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit: BPF prog-id=84 op=LOAD May 13 08:42:40.522000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff69c14a40 a2=74 a3=540051 items=0 ppid=2155 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.522000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:42:40.522000 audit: BPF prog-id=84 op=UNLOAD May 13 08:42:40.522000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit: BPF prog-id=85 op=LOAD May 13 08:42:40.522000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff69c14a70 a2=94 a3=2 items=0 ppid=2155 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.522000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:42:40.522000 audit: BPF prog-id=85 op=UNLOAD May 13 08:42:40.522000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff69c14940 a2=28 a3=0 items=0 ppid=2155 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.522000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff69c14970 a2=28 a3=0 items=0 ppid=2155 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.522000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff69c14880 a2=28 a3=0 items=0 ppid=2155 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.522000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff69c14990 a2=28 a3=0 items=0 ppid=2155 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.522000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff69c14970 a2=28 a3=0 items=0 ppid=2155 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.522000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff69c14960 a2=28 a3=0 items=0 ppid=2155 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.522000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff69c14990 a2=28 a3=0 items=0 ppid=2155 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.522000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff69c14970 a2=28 a3=0 items=0 ppid=2155 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.522000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff69c14990 a2=28 a3=0 items=0 ppid=2155 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.522000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff69c14960 a2=28 a3=0 items=0 ppid=2155 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.522000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff69c149d0 a2=28 a3=0 items=0 ppid=2155 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.522000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.522000 audit: BPF prog-id=86 op=LOAD May 13 08:42:40.522000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff69c14840 a2=40 a3=0 items=0 ppid=2155 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.522000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:42:40.522000 audit: BPF prog-id=86 op=UNLOAD May 13 08:42:40.523000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.523000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff69c14830 a2=50 a3=2800 items=0 ppid=2155 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.523000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:42:40.523000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.523000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff69c14830 a2=50 a3=2800 items=0 ppid=2155 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.523000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:42:40.523000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.523000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.523000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.523000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.523000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.523000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.523000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.523000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.523000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.523000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.523000 audit: BPF prog-id=87 op=LOAD May 13 08:42:40.523000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff69c14050 a2=94 a3=2 items=0 ppid=2155 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.523000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:42:40.523000 audit: BPF prog-id=87 op=UNLOAD May 13 08:42:40.523000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.523000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.523000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.523000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.523000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.523000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.523000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.523000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.523000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.523000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.523000 audit: BPF prog-id=88 op=LOAD May 13 08:42:40.523000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff69c14150 a2=94 a3=30 items=0 ppid=2155 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.523000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 13 08:42:40.540000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.540000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.540000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.540000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.540000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.540000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.540000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.540000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.540000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.540000 audit: BPF prog-id=89 op=LOAD May 13 08:42:40.540000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb0394f60 a2=98 a3=0 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.540000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.541000 audit: BPF prog-id=89 op=UNLOAD May 13 08:42:40.541000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.541000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.541000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.541000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.541000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.541000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.541000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.541000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.541000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.541000 audit: BPF prog-id=90 op=LOAD May 13 08:42:40.541000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdb0394d40 a2=74 a3=540051 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.541000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.541000 audit: BPF prog-id=90 op=UNLOAD May 13 08:42:40.541000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.541000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.541000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.541000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.541000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.541000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.541000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.541000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.541000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.541000 audit: BPF prog-id=91 op=LOAD May 13 08:42:40.541000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdb0394d70 a2=94 a3=2 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.541000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.541000 audit: BPF prog-id=91 op=UNLOAD May 13 08:42:40.545969 env[1147]: time="2025-05-13T08:42:40.531798894Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 08:42:40.545969 env[1147]: time="2025-05-13T08:42:40.531844088Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 08:42:40.545969 env[1147]: time="2025-05-13T08:42:40.531857343Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 08:42:40.545969 env[1147]: time="2025-05-13T08:42:40.531981445Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9 pid=2375 runtime=io.containerd.runc.v2 May 13 08:42:40.555186 systemd[1]: Started cri-containerd-64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9.scope. May 13 08:42:40.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.585000 audit: BPF prog-id=92 op=LOAD May 13 08:42:40.585000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.585000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2375 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634616164656136376231373435613762386633613636396437303430 May 13 08:42:40.586000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.586000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2375 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634616164656136376231373435613762386633613636396437303430 May 13 08:42:40.586000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.586000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.586000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.586000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.586000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.586000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.586000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.586000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.586000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.586000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.586000 audit: BPF prog-id=93 op=LOAD May 13 08:42:40.586000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001bc5f0 items=0 ppid=2375 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634616164656136376231373435613762386633613636396437303430 May 13 08:42:40.587000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.587000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.587000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.587000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.587000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.587000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.587000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.587000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.587000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.587000 audit: BPF prog-id=94 op=LOAD May 13 08:42:40.587000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001bc638 items=0 ppid=2375 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634616164656136376231373435613762386633613636396437303430 May 13 08:42:40.588000 audit: BPF prog-id=94 op=UNLOAD May 13 08:42:40.588000 audit: BPF prog-id=93 op=UNLOAD May 13 08:42:40.588000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.588000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.588000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.588000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.588000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.588000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.588000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.588000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.588000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.588000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.588000 audit: BPF prog-id=95 op=LOAD May 13 08:42:40.588000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001bca48 items=0 ppid=2375 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634616164656136376231373435613762386633613636396437303430 May 13 08:42:40.613774 env[1147]: time="2025-05-13T08:42:40.613733520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-g84xq,Uid:1844c58a-5bb2-45ae-9956-e2c503a474fa,Namespace:calico-system,Attempt:1,} returns sandbox id \"64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9\"" May 13 08:42:40.615864 env[1147]: time="2025-05-13T08:42:40.615839825Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 13 08:42:40.671000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.671000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.671000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.671000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.671000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.671000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.671000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.671000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.671000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.671000 audit: BPF prog-id=96 op=LOAD May 13 08:42:40.671000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdb0394c30 a2=40 a3=1 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.671000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.671000 audit: BPF prog-id=96 op=UNLOAD May 13 08:42:40.671000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.671000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdb0394d00 a2=50 a3=7ffdb0394de0 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.671000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb0394c40 a2=28 a3=0 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.681000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb0394c70 a2=28 a3=0 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.681000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb0394b80 a2=28 a3=0 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.681000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb0394c90 a2=28 a3=0 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.681000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb0394c70 a2=28 a3=0 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.681000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb0394c60 a2=28 a3=0 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.681000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb0394c90 a2=28 a3=0 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.681000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb0394c70 a2=28 a3=0 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.681000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb0394c90 a2=28 a3=0 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.681000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb0394c60 a2=28 a3=0 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.681000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb0394cd0 a2=28 a3=0 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.681000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdb0394a80 a2=50 a3=1 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.681000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit: BPF prog-id=97 op=LOAD May 13 08:42:40.681000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdb0394a80 a2=94 a3=5 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.681000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.681000 audit: BPF prog-id=97 op=UNLOAD May 13 08:42:40.681000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdb0394b30 a2=50 a3=1 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.681000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdb0394c50 a2=4 a3=38 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.681000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.681000 audit[2401]: AVC avc: denied { confidentiality } for pid=2401 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:42:40.681000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdb0394ca0 a2=94 a3=6 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.681000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { confidentiality } for pid=2401 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:42:40.682000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdb0394450 a2=94 a3=83 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.682000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { perfmon } for pid=2401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { confidentiality } for pid=2401 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:42:40.682000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdb0394450 a2=94 a3=83 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.682000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb0395e90 a2=10 a3=f0f1 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.682000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb0395d30 a2=10 a3=3 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.682000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb0395cd0 a2=10 a3=3 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.682000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.682000 audit[2401]: AVC avc: denied { bpf } for pid=2401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:40.682000 audit[2401]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb0395cd0 a2=10 a3=7 items=0 ppid=2155 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.682000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 13 08:42:40.692000 audit: BPF prog-id=88 op=UNLOAD May 13 08:42:40.786636 kubelet[1454]: E0513 08:42:40.786501 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:40.794000 audit[2437]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 08:42:40.794000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fffb3f5a250 a2=0 a3=7fffb3f5a23c items=0 ppid=2155 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.794000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 08:42:40.807000 audit[2438]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=2438 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 08:42:40.807000 audit[2438]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffdcd936590 a2=0 a3=7ffdcd93657c items=0 ppid=2155 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.807000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 08:42:40.810000 audit[2439]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 08:42:40.810000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff20c97c80 a2=0 a3=7fff20c97c6c items=0 ppid=2155 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.810000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 08:42:40.813000 audit[2436]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 08:42:40.813000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd20c78c10 a2=0 a3=7ffd20c78bfc items=0 ppid=2155 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.813000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 08:42:40.834000 audit[2449]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=2449 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 08:42:40.834000 audit[2449]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffc30e4be40 a2=0 a3=7ffc30e4be2c items=0 ppid=2155 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:40.834000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 08:42:41.022302 env[1147]: time="2025-05-13T08:42:41.022193564Z" level=info msg="StopPodSandbox for \"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81\"" May 13 08:42:41.232259 env[1147]: 2025-05-13 08:42:41.139 [INFO][2465] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" May 13 08:42:41.232259 env[1147]: 2025-05-13 08:42:41.139 [INFO][2465] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" iface="eth0" netns="/var/run/netns/cni-79a7c502-afa4-42f2-814c-7d36e6d1b2c3" May 13 08:42:41.232259 env[1147]: 2025-05-13 08:42:41.140 [INFO][2465] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" iface="eth0" netns="/var/run/netns/cni-79a7c502-afa4-42f2-814c-7d36e6d1b2c3" May 13 08:42:41.232259 env[1147]: 2025-05-13 08:42:41.141 [INFO][2465] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" iface="eth0" netns="/var/run/netns/cni-79a7c502-afa4-42f2-814c-7d36e6d1b2c3" May 13 08:42:41.232259 env[1147]: 2025-05-13 08:42:41.141 [INFO][2465] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" May 13 08:42:41.232259 env[1147]: 2025-05-13 08:42:41.141 [INFO][2465] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" May 13 08:42:41.232259 env[1147]: 2025-05-13 08:42:41.206 [INFO][2472] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" HandleID="k8s-pod-network.be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" Workload="172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0" May 13 08:42:41.232259 env[1147]: 2025-05-13 08:42:41.207 [INFO][2472] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:42:41.232259 env[1147]: 2025-05-13 08:42:41.207 [INFO][2472] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:42:41.232259 env[1147]: 2025-05-13 08:42:41.224 [WARNING][2472] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" HandleID="k8s-pod-network.be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" Workload="172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0" May 13 08:42:41.232259 env[1147]: 2025-05-13 08:42:41.224 [INFO][2472] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" HandleID="k8s-pod-network.be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" Workload="172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0" May 13 08:42:41.232259 env[1147]: 2025-05-13 08:42:41.227 [INFO][2472] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:42:41.232259 env[1147]: 2025-05-13 08:42:41.229 [INFO][2465] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" May 13 08:42:41.233670 env[1147]: time="2025-05-13T08:42:41.233606250Z" level=info msg="TearDown network for sandbox \"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81\" successfully" May 13 08:42:41.233890 env[1147]: time="2025-05-13T08:42:41.233820910Z" level=info msg="StopPodSandbox for \"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81\" returns successfully" May 13 08:42:41.239667 env[1147]: time="2025-05-13T08:42:41.238440202Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-rkbvh,Uid:ee4b012b-938a-495d-8e41-e25ae4fa74a1,Namespace:default,Attempt:1,}" May 13 08:42:41.239385 systemd[1]: run-netns-cni\x2d79a7c502\x2dafa4\x2d42f2\x2d814c\x2d7d36e6d1b2c3.mount: Deactivated successfully. May 13 08:42:41.523247 systemd-networkd[991]: calid181f8f4fd0: Link UP May 13 08:42:41.529749 systemd-networkd[991]: calid181f8f4fd0: Gained carrier May 13 08:42:41.530210 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid181f8f4fd0: link becomes ready May 13 08:42:41.559631 env[1147]: 2025-05-13 08:42:41.357 [INFO][2478] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0 nginx-deployment-8587fbcb89- default ee4b012b-938a-495d-8e41-e25ae4fa74a1 1442 0 2025-05-13 08:42:28 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.17 nginx-deployment-8587fbcb89-rkbvh eth0 default [] [] [kns.default ksa.default.default] calid181f8f4fd0 [] []}} ContainerID="eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f" Namespace="default" Pod="nginx-deployment-8587fbcb89-rkbvh" WorkloadEndpoint="172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-" May 13 08:42:41.559631 env[1147]: 2025-05-13 08:42:41.357 [INFO][2478] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f" Namespace="default" Pod="nginx-deployment-8587fbcb89-rkbvh" WorkloadEndpoint="172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0" May 13 08:42:41.559631 env[1147]: 2025-05-13 08:42:41.419 [INFO][2491] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f" HandleID="k8s-pod-network.eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f" Workload="172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0" May 13 08:42:41.559631 env[1147]: 2025-05-13 08:42:41.445 [INFO][2491] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f" HandleID="k8s-pod-network.eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f" Workload="172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031ab30), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.17", "pod":"nginx-deployment-8587fbcb89-rkbvh", "timestamp":"2025-05-13 08:42:41.419562718 +0000 UTC"}, Hostname:"172.24.4.17", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 08:42:41.559631 env[1147]: 2025-05-13 08:42:41.445 [INFO][2491] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:42:41.559631 env[1147]: 2025-05-13 08:42:41.445 [INFO][2491] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:42:41.559631 env[1147]: 2025-05-13 08:42:41.445 [INFO][2491] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.17' May 13 08:42:41.559631 env[1147]: 2025-05-13 08:42:41.450 [INFO][2491] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f" host="172.24.4.17" May 13 08:42:41.559631 env[1147]: 2025-05-13 08:42:41.458 [INFO][2491] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.17" May 13 08:42:41.559631 env[1147]: 2025-05-13 08:42:41.467 [INFO][2491] ipam/ipam.go 489: Trying affinity for 192.168.47.128/26 host="172.24.4.17" May 13 08:42:41.559631 env[1147]: 2025-05-13 08:42:41.471 [INFO][2491] ipam/ipam.go 155: Attempting to load block cidr=192.168.47.128/26 host="172.24.4.17" May 13 08:42:41.559631 env[1147]: 2025-05-13 08:42:41.476 [INFO][2491] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.47.128/26 host="172.24.4.17" May 13 08:42:41.559631 env[1147]: 2025-05-13 08:42:41.477 [INFO][2491] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.47.128/26 handle="k8s-pod-network.eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f" host="172.24.4.17" May 13 08:42:41.559631 env[1147]: 2025-05-13 08:42:41.480 [INFO][2491] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f May 13 08:42:41.559631 env[1147]: 2025-05-13 08:42:41.491 [INFO][2491] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.47.128/26 handle="k8s-pod-network.eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f" host="172.24.4.17" May 13 08:42:41.559631 env[1147]: 2025-05-13 08:42:41.507 [INFO][2491] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.47.130/26] block=192.168.47.128/26 handle="k8s-pod-network.eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f" host="172.24.4.17" May 13 08:42:41.559631 env[1147]: 2025-05-13 08:42:41.507 [INFO][2491] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.47.130/26] handle="k8s-pod-network.eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f" host="172.24.4.17" May 13 08:42:41.559631 env[1147]: 2025-05-13 08:42:41.508 [INFO][2491] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:42:41.559631 env[1147]: 2025-05-13 08:42:41.508 [INFO][2491] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.47.130/26] IPv6=[] ContainerID="eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f" HandleID="k8s-pod-network.eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f" Workload="172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0" May 13 08:42:41.561190 env[1147]: 2025-05-13 08:42:41.511 [INFO][2478] cni-plugin/k8s.go 386: Populated endpoint ContainerID="eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f" Namespace="default" Pod="nginx-deployment-8587fbcb89-rkbvh" WorkloadEndpoint="172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"ee4b012b-938a-495d-8e41-e25ae4fa74a1", ResourceVersion:"1442", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 42, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.17", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-rkbvh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.47.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calid181f8f4fd0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:42:41.561190 env[1147]: 2025-05-13 08:42:41.512 [INFO][2478] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.47.130/32] ContainerID="eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f" Namespace="default" Pod="nginx-deployment-8587fbcb89-rkbvh" WorkloadEndpoint="172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0" May 13 08:42:41.561190 env[1147]: 2025-05-13 08:42:41.512 [INFO][2478] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid181f8f4fd0 ContainerID="eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f" Namespace="default" Pod="nginx-deployment-8587fbcb89-rkbvh" WorkloadEndpoint="172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0" May 13 08:42:41.561190 env[1147]: 2025-05-13 08:42:41.531 [INFO][2478] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f" Namespace="default" Pod="nginx-deployment-8587fbcb89-rkbvh" WorkloadEndpoint="172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0" May 13 08:42:41.561190 env[1147]: 2025-05-13 08:42:41.531 [INFO][2478] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f" Namespace="default" Pod="nginx-deployment-8587fbcb89-rkbvh" WorkloadEndpoint="172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"ee4b012b-938a-495d-8e41-e25ae4fa74a1", ResourceVersion:"1442", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 42, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.17", ContainerID:"eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f", Pod:"nginx-deployment-8587fbcb89-rkbvh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.47.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calid181f8f4fd0", MAC:"26:5d:0a:5f:bb:7d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:42:41.561190 env[1147]: 2025-05-13 08:42:41.546 [INFO][2478] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f" Namespace="default" Pod="nginx-deployment-8587fbcb89-rkbvh" WorkloadEndpoint="172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0" May 13 08:42:41.577000 audit[2507]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=2507 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 08:42:41.577000 audit[2507]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffe63549a80 a2=0 a3=7ffe63549a6c items=0 ppid=2155 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:41.577000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 08:42:41.594291 env[1147]: time="2025-05-13T08:42:41.594198935Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 08:42:41.594492 env[1147]: time="2025-05-13T08:42:41.594453200Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 08:42:41.594600 env[1147]: time="2025-05-13T08:42:41.594576310Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 08:42:41.599733 systemd-networkd[991]: vxlan.calico: Gained IPv6LL May 13 08:42:41.600783 env[1147]: time="2025-05-13T08:42:41.600740629Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f pid=2520 runtime=io.containerd.runc.v2 May 13 08:42:41.622945 systemd[1]: Started cri-containerd-eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f.scope. May 13 08:42:41.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.637000 audit: BPF prog-id=98 op=LOAD May 13 08:42:41.637000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.637000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2520 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:41.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564613630666563656337613766323538346361323839393635643932 May 13 08:42:41.638000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.638000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=2520 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:41.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564613630666563656337613766323538346361323839393635643932 May 13 08:42:41.638000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.638000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.638000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.638000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.638000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.638000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.638000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.638000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.638000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.638000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.638000 audit: BPF prog-id=99 op=LOAD May 13 08:42:41.638000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000213bb0 items=0 ppid=2520 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:41.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564613630666563656337613766323538346361323839393635643932 May 13 08:42:41.639000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.639000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.639000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.639000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.639000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.639000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.639000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.639000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.639000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.639000 audit: BPF prog-id=100 op=LOAD May 13 08:42:41.639000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000213bf8 items=0 ppid=2520 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:41.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564613630666563656337613766323538346361323839393635643932 May 13 08:42:41.639000 audit: BPF prog-id=100 op=UNLOAD May 13 08:42:41.639000 audit: BPF prog-id=99 op=UNLOAD May 13 08:42:41.639000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.639000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.639000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.639000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.639000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.639000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.639000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.639000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.639000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.639000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:41.639000 audit: BPF prog-id=101 op=LOAD May 13 08:42:41.639000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c00029c008 items=0 ppid=2520 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:41.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564613630666563656337613766323538346361323839393635643932 May 13 08:42:41.668065 env[1147]: time="2025-05-13T08:42:41.668011050Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-rkbvh,Uid:ee4b012b-938a-495d-8e41-e25ae4fa74a1,Namespace:default,Attempt:1,} returns sandbox id \"eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f\"" May 13 08:42:41.790667 kubelet[1454]: E0513 08:42:41.787299 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:41.977769 systemd-networkd[991]: cali4e4d9121699: Gained IPv6LL May 13 08:42:42.788018 kubelet[1454]: E0513 08:42:42.787964 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:43.014905 env[1147]: time="2025-05-13T08:42:43.014869259Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:43.018561 env[1147]: time="2025-05-13T08:42:43.018540463Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:43.021320 env[1147]: time="2025-05-13T08:42:43.021299560Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:43.023952 env[1147]: time="2025-05-13T08:42:43.023931100Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:43.024671 env[1147]: time="2025-05-13T08:42:43.024643432Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 13 08:42:43.026550 env[1147]: time="2025-05-13T08:42:43.026528746Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 13 08:42:43.027680 env[1147]: time="2025-05-13T08:42:43.027654310Z" level=info msg="CreateContainer within sandbox \"64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 13 08:42:43.046338 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount712469294.mount: Deactivated successfully. May 13 08:42:43.059739 env[1147]: time="2025-05-13T08:42:43.059701471Z" level=info msg="CreateContainer within sandbox \"64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"81c683014c326e84bb82ca1c8ce284625ab0dbc8e07fa0c86b48b0456e470a01\"" May 13 08:42:43.060718 env[1147]: time="2025-05-13T08:42:43.060695248Z" level=info msg="StartContainer for \"81c683014c326e84bb82ca1c8ce284625ab0dbc8e07fa0c86b48b0456e470a01\"" May 13 08:42:43.099821 systemd[1]: Started cri-containerd-81c683014c326e84bb82ca1c8ce284625ab0dbc8e07fa0c86b48b0456e470a01.scope. May 13 08:42:43.120000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.125063 kernel: kauditd_printk_skb: 668 callbacks suppressed May 13 08:42:43.125139 kernel: audit: type=1400 audit(1747125763.120:643): avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.120000 audit[2567]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fbd700b1638 items=0 ppid=2375 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:43.149327 kernel: audit: type=1300 audit(1747125763.120:643): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fbd700b1638 items=0 ppid=2375 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:43.149379 kernel: audit: type=1327 audit(1747125763.120:643): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831633638333031346333323665383462623832636131633863653238 May 13 08:42:43.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831633638333031346333323665383462623832636131633863653238 May 13 08:42:43.125000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.159562 kernel: audit: type=1400 audit(1747125763.125:644): avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.159607 kernel: audit: type=1400 audit(1747125763.125:644): avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.125000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.125000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.169288 kernel: audit: type=1400 audit(1747125763.125:644): avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.169340 kernel: audit: type=1400 audit(1747125763.125:644): avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.125000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.125000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.177108 systemd[1]: run-containerd-runc-k8s.io-81c683014c326e84bb82ca1c8ce284625ab0dbc8e07fa0c86b48b0456e470a01-runc.04UssS.mount: Deactivated successfully. May 13 08:42:43.181207 kernel: audit: type=1400 audit(1747125763.125:644): avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.125000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.125000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.191368 kernel: audit: type=1400 audit(1747125763.125:644): avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.191493 kernel: audit: type=1400 audit(1747125763.125:644): avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.125000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.125000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.125000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.125000 audit: BPF prog-id=102 op=LOAD May 13 08:42:43.125000 audit[2567]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0002d5b88 items=0 ppid=2375 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:43.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831633638333031346333323665383462623832636131633863653238 May 13 08:42:43.134000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.134000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.134000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.134000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.134000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.134000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.134000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.134000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.134000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.134000 audit: BPF prog-id=103 op=LOAD May 13 08:42:43.134000 audit[2567]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0002d5bd8 items=0 ppid=2375 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:43.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831633638333031346333323665383462623832636131633863653238 May 13 08:42:43.153000 audit: BPF prog-id=103 op=UNLOAD May 13 08:42:43.153000 audit: BPF prog-id=102 op=UNLOAD May 13 08:42:43.153000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.153000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.153000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.153000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.153000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.153000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.153000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.153000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.153000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.153000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:43.153000 audit: BPF prog-id=104 op=LOAD May 13 08:42:43.153000 audit[2567]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0002d5c68 items=0 ppid=2375 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:43.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831633638333031346333323665383462623832636131633863653238 May 13 08:42:43.205258 systemd-networkd[991]: calid181f8f4fd0: Gained IPv6LL May 13 08:42:43.215166 env[1147]: time="2025-05-13T08:42:43.215084750Z" level=info msg="StartContainer for \"81c683014c326e84bb82ca1c8ce284625ab0dbc8e07fa0c86b48b0456e470a01\" returns successfully" May 13 08:42:43.789113 kubelet[1454]: E0513 08:42:43.789019 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:44.789767 kubelet[1454]: E0513 08:42:44.789665 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:45.790475 kubelet[1454]: E0513 08:42:45.790392 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:46.790818 kubelet[1454]: E0513 08:42:46.790762 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:47.791762 kubelet[1454]: E0513 08:42:47.791673 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:48.122927 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount595469437.mount: Deactivated successfully. May 13 08:42:48.792555 kubelet[1454]: E0513 08:42:48.792493 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:49.750672 kubelet[1454]: E0513 08:42:49.750540 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:49.794704 kubelet[1454]: E0513 08:42:49.794437 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:50.307709 env[1147]: time="2025-05-13T08:42:50.307614822Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:50.313024 env[1147]: time="2025-05-13T08:42:50.312949416Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:50.317661 env[1147]: time="2025-05-13T08:42:50.317598598Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:50.322784 env[1147]: time="2025-05-13T08:42:50.322722288Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:50.326041 env[1147]: time="2025-05-13T08:42:50.325963264Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 13 08:42:50.334430 env[1147]: time="2025-05-13T08:42:50.334356583Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 13 08:42:50.337604 env[1147]: time="2025-05-13T08:42:50.337383599Z" level=info msg="CreateContainer within sandbox \"eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 13 08:42:50.367079 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2427634386.mount: Deactivated successfully. May 13 08:42:50.383379 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount878133768.mount: Deactivated successfully. May 13 08:42:50.391060 env[1147]: time="2025-05-13T08:42:50.390980914Z" level=info msg="CreateContainer within sandbox \"eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"f6ad69108adca3964ebdf4697ddc76bb7558b544c468359dc11273e15f20bd4c\"" May 13 08:42:50.392586 env[1147]: time="2025-05-13T08:42:50.392407153Z" level=info msg="StartContainer for \"f6ad69108adca3964ebdf4697ddc76bb7558b544c468359dc11273e15f20bd4c\"" May 13 08:42:50.424683 systemd[1]: Started cri-containerd-f6ad69108adca3964ebdf4697ddc76bb7558b544c468359dc11273e15f20bd4c.scope. May 13 08:42:50.450378 kernel: kauditd_printk_skb: 33 callbacks suppressed May 13 08:42:50.450479 kernel: audit: type=1400 audit(1747125770.443:649): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.450504 kernel: audit: type=1400 audit(1747125770.443:650): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.454613 kernel: audit: type=1400 audit(1747125770.443:651): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.470065 kernel: audit: type=1400 audit(1747125770.443:652): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.470157 kernel: audit: type=1400 audit(1747125770.443:653): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.480610 kernel: audit: type=1400 audit(1747125770.443:654): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.480758 kernel: audit: type=1400 audit(1747125770.443:655): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.480786 kernel: audit: type=1400 audit(1747125770.443:656): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.492319 kernel: audit: type=1400 audit(1747125770.443:657): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.492407 kernel: audit: type=1400 audit(1747125770.454:658): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.454000 audit: BPF prog-id=105 op=LOAD May 13 08:42:50.458000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2520 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:50.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636616436393130386164636133393634656264663436393764646337 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2520 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:50.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636616436393130386164636133393634656264663436393764646337 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit: BPF prog-id=106 op=LOAD May 13 08:42:50.458000 audit[2610]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003c8990 items=0 ppid=2520 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:50.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636616436393130386164636133393634656264663436393764646337 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit: BPF prog-id=107 op=LOAD May 13 08:42:50.458000 audit[2610]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003c89d8 items=0 ppid=2520 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:50.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636616436393130386164636133393634656264663436393764646337 May 13 08:42:50.458000 audit: BPF prog-id=107 op=UNLOAD May 13 08:42:50.458000 audit: BPF prog-id=106 op=UNLOAD May 13 08:42:50.458000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { perfmon } for pid=2610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit[2610]: AVC avc: denied { bpf } for pid=2610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:50.458000 audit: BPF prog-id=108 op=LOAD May 13 08:42:50.458000 audit[2610]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c8de8 items=0 ppid=2520 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:50.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636616436393130386164636133393634656264663436393764646337 May 13 08:42:50.505241 env[1147]: time="2025-05-13T08:42:50.505203707Z" level=info msg="StartContainer for \"f6ad69108adca3964ebdf4697ddc76bb7558b544c468359dc11273e15f20bd4c\" returns successfully" May 13 08:42:50.795810 kubelet[1454]: E0513 08:42:50.795600 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:51.278396 kubelet[1454]: I0513 08:42:51.278295 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-rkbvh" podStartSLOduration=14.61672727 podStartE2EDuration="23.278257774s" podCreationTimestamp="2025-05-13 08:42:28 +0000 UTC" firstStartedPulling="2025-05-13 08:42:41.669334744 +0000 UTC m=+32.623933228" lastFinishedPulling="2025-05-13 08:42:50.330865198 +0000 UTC m=+41.285463732" observedRunningTime="2025-05-13 08:42:51.277991977 +0000 UTC m=+42.232590521" watchObservedRunningTime="2025-05-13 08:42:51.278257774 +0000 UTC m=+42.232856309" May 13 08:42:51.796720 kubelet[1454]: E0513 08:42:51.796591 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:52.797043 kubelet[1454]: E0513 08:42:52.796987 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:53.240301 env[1147]: time="2025-05-13T08:42:53.240232224Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:53.243359 env[1147]: time="2025-05-13T08:42:53.243316108Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:53.246207 env[1147]: time="2025-05-13T08:42:53.246168148Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:53.249079 env[1147]: time="2025-05-13T08:42:53.249037079Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:42:53.249866 env[1147]: time="2025-05-13T08:42:53.249818041Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 13 08:42:53.253597 env[1147]: time="2025-05-13T08:42:53.253548886Z" level=info msg="CreateContainer within sandbox \"64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 13 08:42:53.276242 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2172017151.mount: Deactivated successfully. May 13 08:42:53.287346 env[1147]: time="2025-05-13T08:42:53.287269623Z" level=info msg="CreateContainer within sandbox \"64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"2d91a2c9b9788f52f5d1afde50e7863df71978db2c31669809566a780c649d0c\"" May 13 08:42:53.288200 env[1147]: time="2025-05-13T08:42:53.288065293Z" level=info msg="StartContainer for \"2d91a2c9b9788f52f5d1afde50e7863df71978db2c31669809566a780c649d0c\"" May 13 08:42:53.336141 systemd[1]: Started cri-containerd-2d91a2c9b9788f52f5d1afde50e7863df71978db2c31669809566a780c649d0c.scope. May 13 08:42:53.356000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.356000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fee12aa0448 items=0 ppid=2375 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:53.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264393161326339623937383866353266356431616664653530653738 May 13 08:42:53.357000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.357000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.357000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.357000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.357000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.357000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.357000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.357000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.357000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.357000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.357000 audit: BPF prog-id=109 op=LOAD May 13 08:42:53.357000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00021a208 items=0 ppid=2375 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:53.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264393161326339623937383866353266356431616664653530653738 May 13 08:42:53.359000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.359000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.359000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.359000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.359000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.359000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.359000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.359000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.359000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.359000 audit: BPF prog-id=110 op=LOAD May 13 08:42:53.359000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00021a258 items=0 ppid=2375 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:53.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264393161326339623937383866353266356431616664653530653738 May 13 08:42:53.359000 audit: BPF prog-id=110 op=UNLOAD May 13 08:42:53.359000 audit: BPF prog-id=109 op=UNLOAD May 13 08:42:53.359000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.359000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.359000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.359000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.359000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.359000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.359000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.359000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.359000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.359000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:42:53.359000 audit: BPF prog-id=111 op=LOAD May 13 08:42:53.359000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00021a2e8 items=0 ppid=2375 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:53.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264393161326339623937383866353266356431616664653530653738 May 13 08:42:53.387109 env[1147]: time="2025-05-13T08:42:53.387043783Z" level=info msg="StartContainer for \"2d91a2c9b9788f52f5d1afde50e7863df71978db2c31669809566a780c649d0c\" returns successfully" May 13 08:42:53.797298 kubelet[1454]: E0513 08:42:53.797213 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:53.951757 kubelet[1454]: I0513 08:42:53.951649 1454 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 13 08:42:53.951757 kubelet[1454]: I0513 08:42:53.951760 1454 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 13 08:42:54.272675 systemd[1]: run-containerd-runc-k8s.io-2d91a2c9b9788f52f5d1afde50e7863df71978db2c31669809566a780c649d0c-runc.bOMnvG.mount: Deactivated successfully. May 13 08:42:54.798615 kubelet[1454]: E0513 08:42:54.798460 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:55.800353 kubelet[1454]: E0513 08:42:55.800214 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:56.802389 kubelet[1454]: E0513 08:42:56.802289 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:57.804401 kubelet[1454]: E0513 08:42:57.804089 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:58.806276 kubelet[1454]: E0513 08:42:58.806230 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:42:58.902000 audit[2707]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=2707 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:42:58.905201 kernel: kauditd_printk_skb: 90 callbacks suppressed May 13 08:42:58.905467 kernel: audit: type=1325 audit(1747125778.902:673): table=filter:71 family=2 entries=20 op=nft_register_rule pid=2707 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:42:58.902000 audit[2707]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffdb0d55f20 a2=0 a3=7ffdb0d55f0c items=0 ppid=1734 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:58.920015 kernel: audit: type=1300 audit(1747125778.902:673): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffdb0d55f20 a2=0 a3=7ffdb0d55f0c items=0 ppid=1734 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:58.920285 kernel: audit: type=1327 audit(1747125778.902:673): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:42:58.902000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:42:58.912000 audit[2707]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=2707 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:42:58.927979 kernel: audit: type=1325 audit(1747125778.912:674): table=nat:72 family=2 entries=22 op=nft_register_rule pid=2707 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:42:58.928166 kernel: audit: type=1300 audit(1747125778.912:674): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdb0d55f20 a2=0 a3=0 items=0 ppid=1734 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:58.912000 audit[2707]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdb0d55f20 a2=0 a3=0 items=0 ppid=1734 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:58.912000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:42:58.938890 kernel: audit: type=1327 audit(1747125778.912:674): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:42:58.946505 kubelet[1454]: I0513 08:42:58.946441 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-g84xq" podStartSLOduration=36.31018552 podStartE2EDuration="48.946420319s" podCreationTimestamp="2025-05-13 08:42:10 +0000 UTC" firstStartedPulling="2025-05-13 08:42:40.615289577 +0000 UTC m=+31.569888061" lastFinishedPulling="2025-05-13 08:42:53.251524346 +0000 UTC m=+44.206122860" observedRunningTime="2025-05-13 08:42:54.323558473 +0000 UTC m=+45.278157007" watchObservedRunningTime="2025-05-13 08:42:58.946420319 +0000 UTC m=+49.901018813" May 13 08:42:58.959109 systemd[1]: Created slice kubepods-besteffort-podfa54ef55_7a0a_4690_8ec9_0b2aca8b73b1.slice. May 13 08:42:58.963000 audit[2712]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=2712 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:42:58.963000 audit[2712]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffcfd193600 a2=0 a3=7ffcfd1935ec items=0 ppid=1734 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:58.976044 kernel: audit: type=1325 audit(1747125778.963:675): table=filter:73 family=2 entries=32 op=nft_register_rule pid=2712 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:42:58.976332 kernel: audit: type=1300 audit(1747125778.963:675): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffcfd193600 a2=0 a3=7ffcfd1935ec items=0 ppid=1734 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:58.976419 kernel: audit: type=1327 audit(1747125778.963:675): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:42:58.963000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:42:58.979794 kernel: audit: type=1325 audit(1747125778.978:676): table=nat:74 family=2 entries=22 op=nft_register_rule pid=2712 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:42:58.978000 audit[2712]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2712 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:42:58.978000 audit[2712]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcfd193600 a2=0 a3=0 items=0 ppid=1734 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:42:58.978000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:42:59.084534 kubelet[1454]: I0513 08:42:59.084266 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/fa54ef55-7a0a-4690-8ec9-0b2aca8b73b1-data\") pod \"nfs-server-provisioner-0\" (UID: \"fa54ef55-7a0a-4690-8ec9-0b2aca8b73b1\") " pod="default/nfs-server-provisioner-0" May 13 08:42:59.084773 kubelet[1454]: I0513 08:42:59.084518 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q7dqj\" (UniqueName: \"kubernetes.io/projected/fa54ef55-7a0a-4690-8ec9-0b2aca8b73b1-kube-api-access-q7dqj\") pod \"nfs-server-provisioner-0\" (UID: \"fa54ef55-7a0a-4690-8ec9-0b2aca8b73b1\") " pod="default/nfs-server-provisioner-0" May 13 08:42:59.265891 env[1147]: time="2025-05-13T08:42:59.265420818Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:fa54ef55-7a0a-4690-8ec9-0b2aca8b73b1,Namespace:default,Attempt:0,}" May 13 08:42:59.807864 kubelet[1454]: E0513 08:42:59.807775 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:00.115506 systemd-networkd[991]: cali60e51b789ff: Link UP May 13 08:43:00.119775 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 08:43:00.120997 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 13 08:43:00.121858 systemd-networkd[991]: cali60e51b789ff: Gained carrier May 13 08:43:00.182325 env[1147]: 2025-05-13 08:42:59.860 [INFO][2715] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.17-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default fa54ef55-7a0a-4690-8ec9-0b2aca8b73b1 1516 0 2025-05-13 08:42:58 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.24.4.17 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.17-k8s-nfs--server--provisioner--0-" May 13 08:43:00.182325 env[1147]: 2025-05-13 08:42:59.860 [INFO][2715] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.17-k8s-nfs--server--provisioner--0-eth0" May 13 08:43:00.182325 env[1147]: 2025-05-13 08:42:59.940 [INFO][2727] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8" HandleID="k8s-pod-network.4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8" Workload="172.24.4.17-k8s-nfs--server--provisioner--0-eth0" May 13 08:43:00.182325 env[1147]: 2025-05-13 08:42:59.963 [INFO][2727] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8" HandleID="k8s-pod-network.4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8" Workload="172.24.4.17-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318a40), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.17", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-13 08:42:59.940090365 +0000 UTC"}, Hostname:"172.24.4.17", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 08:43:00.182325 env[1147]: 2025-05-13 08:42:59.963 [INFO][2727] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:43:00.182325 env[1147]: 2025-05-13 08:42:59.963 [INFO][2727] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:43:00.182325 env[1147]: 2025-05-13 08:42:59.963 [INFO][2727] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.17' May 13 08:43:00.182325 env[1147]: 2025-05-13 08:42:59.968 [INFO][2727] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8" host="172.24.4.17" May 13 08:43:00.182325 env[1147]: 2025-05-13 08:42:59.974 [INFO][2727] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.17" May 13 08:43:00.182325 env[1147]: 2025-05-13 08:42:59.986 [INFO][2727] ipam/ipam.go 489: Trying affinity for 192.168.47.128/26 host="172.24.4.17" May 13 08:43:00.182325 env[1147]: 2025-05-13 08:42:59.991 [INFO][2727] ipam/ipam.go 155: Attempting to load block cidr=192.168.47.128/26 host="172.24.4.17" May 13 08:43:00.182325 env[1147]: 2025-05-13 08:43:00.000 [INFO][2727] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.47.128/26 host="172.24.4.17" May 13 08:43:00.182325 env[1147]: 2025-05-13 08:43:00.000 [INFO][2727] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.47.128/26 handle="k8s-pod-network.4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8" host="172.24.4.17" May 13 08:43:00.182325 env[1147]: 2025-05-13 08:43:00.003 [INFO][2727] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8 May 13 08:43:00.182325 env[1147]: 2025-05-13 08:43:00.065 [INFO][2727] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.47.128/26 handle="k8s-pod-network.4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8" host="172.24.4.17" May 13 08:43:00.182325 env[1147]: 2025-05-13 08:43:00.097 [INFO][2727] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.47.131/26] block=192.168.47.128/26 handle="k8s-pod-network.4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8" host="172.24.4.17" May 13 08:43:00.182325 env[1147]: 2025-05-13 08:43:00.097 [INFO][2727] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.47.131/26] handle="k8s-pod-network.4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8" host="172.24.4.17" May 13 08:43:00.182325 env[1147]: 2025-05-13 08:43:00.097 [INFO][2727] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:43:00.182325 env[1147]: 2025-05-13 08:43:00.097 [INFO][2727] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.47.131/26] IPv6=[] ContainerID="4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8" HandleID="k8s-pod-network.4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8" Workload="172.24.4.17-k8s-nfs--server--provisioner--0-eth0" May 13 08:43:00.184773 env[1147]: 2025-05-13 08:43:00.101 [INFO][2715] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.17-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.17-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"fa54ef55-7a0a-4690-8ec9-0b2aca8b73b1", ResourceVersion:"1516", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 42, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.17", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.47.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:43:00.184773 env[1147]: 2025-05-13 08:43:00.101 [INFO][2715] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.47.131/32] ContainerID="4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.17-k8s-nfs--server--provisioner--0-eth0" May 13 08:43:00.184773 env[1147]: 2025-05-13 08:43:00.101 [INFO][2715] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.17-k8s-nfs--server--provisioner--0-eth0" May 13 08:43:00.184773 env[1147]: 2025-05-13 08:43:00.121 [INFO][2715] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.17-k8s-nfs--server--provisioner--0-eth0" May 13 08:43:00.196756 env[1147]: 2025-05-13 08:43:00.123 [INFO][2715] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.17-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.17-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"fa54ef55-7a0a-4690-8ec9-0b2aca8b73b1", ResourceVersion:"1516", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 42, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.17", ContainerID:"4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.47.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"3e:c9:39:4b:5b:f2", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:43:00.196756 env[1147]: 2025-05-13 08:43:00.173 [INFO][2715] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.17-k8s-nfs--server--provisioner--0-eth0" May 13 08:43:00.224000 audit[2748]: NETFILTER_CFG table=filter:75 family=2 entries=38 op=nft_register_chain pid=2748 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 08:43:00.224000 audit[2748]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffd47824490 a2=0 a3=7ffd4782447c items=0 ppid=2155 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:00.224000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 08:43:00.277382 env[1147]: time="2025-05-13T08:43:00.277108292Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 08:43:00.277382 env[1147]: time="2025-05-13T08:43:00.277286385Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 08:43:00.277382 env[1147]: time="2025-05-13T08:43:00.277320439Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 08:43:00.278816 env[1147]: time="2025-05-13T08:43:00.278712638Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8 pid=2757 runtime=io.containerd.runc.v2 May 13 08:43:00.335408 systemd[1]: run-containerd-runc-k8s.io-4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8-runc.xbzsX6.mount: Deactivated successfully. May 13 08:43:00.339756 systemd[1]: Started cri-containerd-4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8.scope. May 13 08:43:00.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.353000 audit: BPF prog-id=112 op=LOAD May 13 08:43:00.354000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.354000 audit[2766]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2757 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:00.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437393361323736316637363437636437373466343261653631383135 May 13 08:43:00.354000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.354000 audit[2766]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2757 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:00.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437393361323736316637363437636437373466343261653631383135 May 13 08:43:00.355000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.355000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.355000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.355000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.355000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.355000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.355000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.355000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.355000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.355000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.355000 audit: BPF prog-id=113 op=LOAD May 13 08:43:00.355000 audit[2766]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003cb1d0 items=0 ppid=2757 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:00.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437393361323736316637363437636437373466343261653631383135 May 13 08:43:00.355000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.355000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.355000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.355000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.355000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.355000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.355000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.355000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.355000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.355000 audit: BPF prog-id=114 op=LOAD May 13 08:43:00.355000 audit[2766]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003cb218 items=0 ppid=2757 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:00.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437393361323736316637363437636437373466343261653631383135 May 13 08:43:00.356000 audit: BPF prog-id=114 op=UNLOAD May 13 08:43:00.356000 audit: BPF prog-id=113 op=UNLOAD May 13 08:43:00.356000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.356000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.356000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.356000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.356000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.356000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.356000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.356000 audit[2766]: AVC avc: denied { perfmon } for pid=2766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.356000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.356000 audit[2766]: AVC avc: denied { bpf } for pid=2766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:00.356000 audit: BPF prog-id=115 op=LOAD May 13 08:43:00.356000 audit[2766]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003cb628 items=0 ppid=2757 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:00.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437393361323736316637363437636437373466343261653631383135 May 13 08:43:00.390523 env[1147]: time="2025-05-13T08:43:00.388002841Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:fa54ef55-7a0a-4690-8ec9-0b2aca8b73b1,Namespace:default,Attempt:0,} returns sandbox id \"4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8\"" May 13 08:43:00.392646 env[1147]: time="2025-05-13T08:43:00.392392735Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 13 08:43:00.808730 kubelet[1454]: E0513 08:43:00.808655 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:01.368469 systemd-networkd[991]: cali60e51b789ff: Gained IPv6LL May 13 08:43:01.808837 kubelet[1454]: E0513 08:43:01.808790 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:02.809935 kubelet[1454]: E0513 08:43:02.809806 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:03.810848 kubelet[1454]: E0513 08:43:03.810751 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:04.264765 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3704843167.mount: Deactivated successfully. May 13 08:43:04.811249 kubelet[1454]: E0513 08:43:04.811197 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:05.812244 kubelet[1454]: E0513 08:43:05.812173 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:06.102816 systemd[1]: run-containerd-runc-k8s.io-35137ec69b9f248c6813546cc8a9025842e2f351749f4488f7dffffa52c1e622-runc.zM2Hfp.mount: Deactivated successfully. May 13 08:43:06.813154 kubelet[1454]: E0513 08:43:06.812940 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:07.188968 env[1147]: time="2025-05-13T08:43:07.188908476Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:43:07.193409 env[1147]: time="2025-05-13T08:43:07.193383283Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:43:07.198390 env[1147]: time="2025-05-13T08:43:07.198367661Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:43:07.202584 env[1147]: time="2025-05-13T08:43:07.202555928Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:43:07.205901 env[1147]: time="2025-05-13T08:43:07.205790540Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 13 08:43:07.210765 env[1147]: time="2025-05-13T08:43:07.210701497Z" level=info msg="CreateContainer within sandbox \"4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 13 08:43:07.237240 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1622951579.mount: Deactivated successfully. May 13 08:43:07.239042 env[1147]: time="2025-05-13T08:43:07.239009419Z" level=info msg="CreateContainer within sandbox \"4793a2761f7647cd774f42ae6181550ff98567a2878691644a39db84bf520cd8\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"6423c7041c0e0e5e9cf6ad5fe1120a1f5a156b6bbf30a54966dd0295aab86155\"" May 13 08:43:07.240479 env[1147]: time="2025-05-13T08:43:07.240412268Z" level=info msg="StartContainer for \"6423c7041c0e0e5e9cf6ad5fe1120a1f5a156b6bbf30a54966dd0295aab86155\"" May 13 08:43:07.292611 systemd[1]: run-containerd-runc-k8s.io-6423c7041c0e0e5e9cf6ad5fe1120a1f5a156b6bbf30a54966dd0295aab86155-runc.GCIG4V.mount: Deactivated successfully. May 13 08:43:07.300756 systemd[1]: Started cri-containerd-6423c7041c0e0e5e9cf6ad5fe1120a1f5a156b6bbf30a54966dd0295aab86155.scope. May 13 08:43:07.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.327382 kernel: kauditd_printk_skb: 62 callbacks suppressed May 13 08:43:07.327537 kernel: audit: type=1400 audit(1747125787.320:696): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.327590 kernel: audit: type=1400 audit(1747125787.321:697): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.336262 kernel: audit: type=1400 audit(1747125787.321:698): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.340832 kernel: audit: type=1400 audit(1747125787.321:699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.345689 kernel: audit: type=1400 audit(1747125787.321:700): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.345770 kernel: audit: type=1400 audit(1747125787.321:701): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.360388 kernel: audit: type=1400 audit(1747125787.321:702): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.360508 kernel: audit: type=1400 audit(1747125787.321:703): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.360543 kernel: audit: type=1400 audit(1747125787.321:704): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.365040 kernel: audit: type=1400 audit(1747125787.321:705): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.321000 audit: BPF prog-id=116 op=LOAD May 13 08:43:07.321000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.321000 audit[2829]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2757 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:07.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634323363373034316330653065356539636636616435666531313230 May 13 08:43:07.321000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.321000 audit[2829]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2757 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:07.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634323363373034316330653065356539636636616435666531313230 May 13 08:43:07.321000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.321000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.321000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.321000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.321000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.321000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.321000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.321000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.321000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.321000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.321000 audit: BPF prog-id=117 op=LOAD May 13 08:43:07.321000 audit[2829]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00031eae0 items=0 ppid=2757 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:07.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634323363373034316330653065356539636636616435666531313230 May 13 08:43:07.331000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.331000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.331000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.331000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.331000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.331000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.331000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.331000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.331000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.331000 audit: BPF prog-id=118 op=LOAD May 13 08:43:07.331000 audit[2829]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00031eb28 items=0 ppid=2757 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:07.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634323363373034316330653065356539636636616435666531313230 May 13 08:43:07.336000 audit: BPF prog-id=118 op=UNLOAD May 13 08:43:07.336000 audit: BPF prog-id=117 op=UNLOAD May 13 08:43:07.336000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.336000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.336000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.336000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.336000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.336000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.336000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.336000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.336000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.336000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:07.336000 audit: BPF prog-id=119 op=LOAD May 13 08:43:07.336000 audit[2829]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00031ef38 items=0 ppid=2757 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:07.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634323363373034316330653065356539636636616435666531313230 May 13 08:43:07.391024 env[1147]: time="2025-05-13T08:43:07.390968295Z" level=info msg="StartContainer for \"6423c7041c0e0e5e9cf6ad5fe1120a1f5a156b6bbf30a54966dd0295aab86155\" returns successfully" May 13 08:43:07.427068 kubelet[1454]: I0513 08:43:07.427000 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.61121714 podStartE2EDuration="9.426954298s" podCreationTimestamp="2025-05-13 08:42:58 +0000 UTC" firstStartedPulling="2025-05-13 08:43:00.392060463 +0000 UTC m=+51.346658947" lastFinishedPulling="2025-05-13 08:43:07.207797621 +0000 UTC m=+58.162396105" observedRunningTime="2025-05-13 08:43:07.426558256 +0000 UTC m=+58.381156740" watchObservedRunningTime="2025-05-13 08:43:07.426954298 +0000 UTC m=+58.381552782" May 13 08:43:07.443000 audit[2857]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=2857 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:43:07.443000 audit[2857]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffabcea060 a2=0 a3=7fffabcea04c items=0 ppid=1734 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:07.443000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:43:07.448000 audit[2858]: AVC avc: denied { search } for pid=2858 comm="rpcbind" name="crypto" dev="proc" ino=21966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c807 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 13 08:43:07.448000 audit[2858]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7ff76ba690c0 a2=0 a3=0 items=0 ppid=2839 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c807 key=(null) May 13 08:43:07.448000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 13 08:43:07.452000 audit[2857]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=2857 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 13 08:43:07.452000 audit[2857]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffabcea060 a2=0 a3=7fffabcea04c items=0 ppid=1734 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:07.452000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 13 08:43:07.519000 audit[2864]: AVC avc: denied { search } for pid=2864 comm="dbus-daemon" name="crypto" dev="proc" ino=21966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c807 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 13 08:43:07.519000 audit[2864]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f4855f8d0c0 a2=0 a3=0 items=0 ppid=2839 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c807 key=(null) May 13 08:43:07.519000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 13 08:43:07.523000 audit[2865]: AVC avc: denied { watch } for pid=2865 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538207 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c807 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c582,c807 tclass=dir permissive=0 May 13 08:43:07.523000 audit[2865]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55ed620f7bf0 a2=2c8 a3=7fff56dec98c items=0 ppid=2839 pid=2865 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c807 key=(null) May 13 08:43:07.523000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 13 08:43:07.528000 audit[2866]: AVC avc: denied { read } for pid=2866 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23181 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c807 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 13 08:43:07.528000 audit[2866]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f197de5c320 a1=80000 a2=d a3=7ffc7e02d780 items=0 ppid=2839 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c807 key=(null) May 13 08:43:07.528000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 13 08:43:07.530000 audit[2866]: AVC avc: denied { search } for pid=2866 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c807 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 13 08:43:07.530000 audit[2866]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f197d3b00c0 a2=0 a3=0 items=0 ppid=2839 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c807 key=(null) May 13 08:43:07.530000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 13 08:43:07.814318 kubelet[1454]: E0513 08:43:07.814092 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:08.814447 kubelet[1454]: E0513 08:43:08.814379 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:09.750858 kubelet[1454]: E0513 08:43:09.750794 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:09.811469 env[1147]: time="2025-05-13T08:43:09.811382203Z" level=info msg="StopPodSandbox for \"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6\"" May 13 08:43:09.816409 kubelet[1454]: E0513 08:43:09.816328 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:10.037793 env[1147]: 2025-05-13 08:43:09.913 [WARNING][2882] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.17-k8s-csi--node--driver--g84xq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1844c58a-5bb2-45ae-9956-e2c503a474fa", ResourceVersion:"1488", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 42, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.17", ContainerID:"64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9", Pod:"csi-node-driver-g84xq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.47.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali4e4d9121699", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:43:10.037793 env[1147]: 2025-05-13 08:43:09.913 [INFO][2882] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" May 13 08:43:10.037793 env[1147]: 2025-05-13 08:43:09.914 [INFO][2882] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" iface="eth0" netns="" May 13 08:43:10.037793 env[1147]: 2025-05-13 08:43:09.914 [INFO][2882] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" May 13 08:43:10.037793 env[1147]: 2025-05-13 08:43:09.914 [INFO][2882] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" May 13 08:43:10.037793 env[1147]: 2025-05-13 08:43:09.983 [INFO][2890] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" HandleID="k8s-pod-network.2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" Workload="172.24.4.17-k8s-csi--node--driver--g84xq-eth0" May 13 08:43:10.037793 env[1147]: 2025-05-13 08:43:09.984 [INFO][2890] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:43:10.037793 env[1147]: 2025-05-13 08:43:09.984 [INFO][2890] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:43:10.037793 env[1147]: 2025-05-13 08:43:10.001 [WARNING][2890] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" HandleID="k8s-pod-network.2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" Workload="172.24.4.17-k8s-csi--node--driver--g84xq-eth0" May 13 08:43:10.037793 env[1147]: 2025-05-13 08:43:10.002 [INFO][2890] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" HandleID="k8s-pod-network.2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" Workload="172.24.4.17-k8s-csi--node--driver--g84xq-eth0" May 13 08:43:10.037793 env[1147]: 2025-05-13 08:43:10.014 [INFO][2890] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:43:10.037793 env[1147]: 2025-05-13 08:43:10.029 [INFO][2882] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" May 13 08:43:10.037793 env[1147]: time="2025-05-13T08:43:10.036968149Z" level=info msg="TearDown network for sandbox \"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6\" successfully" May 13 08:43:10.037793 env[1147]: time="2025-05-13T08:43:10.037192540Z" level=info msg="StopPodSandbox for \"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6\" returns successfully" May 13 08:43:10.039862 env[1147]: time="2025-05-13T08:43:10.039829021Z" level=info msg="RemovePodSandbox for \"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6\"" May 13 08:43:10.040003 env[1147]: time="2025-05-13T08:43:10.039955944Z" level=info msg="Forcibly stopping sandbox \"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6\"" May 13 08:43:10.168100 env[1147]: 2025-05-13 08:43:10.103 [WARNING][2912] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.17-k8s-csi--node--driver--g84xq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1844c58a-5bb2-45ae-9956-e2c503a474fa", ResourceVersion:"1488", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 42, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.17", ContainerID:"64aadea67b1745a7b8f3a669d70402aca792432ed638311cca9789c81bce0bf9", Pod:"csi-node-driver-g84xq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.47.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali4e4d9121699", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:43:10.168100 env[1147]: 2025-05-13 08:43:10.104 [INFO][2912] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" May 13 08:43:10.168100 env[1147]: 2025-05-13 08:43:10.104 [INFO][2912] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" iface="eth0" netns="" May 13 08:43:10.168100 env[1147]: 2025-05-13 08:43:10.104 [INFO][2912] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" May 13 08:43:10.168100 env[1147]: 2025-05-13 08:43:10.104 [INFO][2912] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" May 13 08:43:10.168100 env[1147]: 2025-05-13 08:43:10.147 [INFO][2920] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" HandleID="k8s-pod-network.2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" Workload="172.24.4.17-k8s-csi--node--driver--g84xq-eth0" May 13 08:43:10.168100 env[1147]: 2025-05-13 08:43:10.147 [INFO][2920] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:43:10.168100 env[1147]: 2025-05-13 08:43:10.147 [INFO][2920] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:43:10.168100 env[1147]: 2025-05-13 08:43:10.161 [WARNING][2920] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" HandleID="k8s-pod-network.2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" Workload="172.24.4.17-k8s-csi--node--driver--g84xq-eth0" May 13 08:43:10.168100 env[1147]: 2025-05-13 08:43:10.162 [INFO][2920] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" HandleID="k8s-pod-network.2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" Workload="172.24.4.17-k8s-csi--node--driver--g84xq-eth0" May 13 08:43:10.168100 env[1147]: 2025-05-13 08:43:10.165 [INFO][2920] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:43:10.168100 env[1147]: 2025-05-13 08:43:10.166 [INFO][2912] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6" May 13 08:43:10.169699 env[1147]: time="2025-05-13T08:43:10.169628527Z" level=info msg="TearDown network for sandbox \"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6\" successfully" May 13 08:43:10.175174 env[1147]: time="2025-05-13T08:43:10.175065275Z" level=info msg="RemovePodSandbox \"2be8baa7089ca26c9a9ac4a2479923900263a01030bebf106122fe20b697e6e6\" returns successfully" May 13 08:43:10.176067 env[1147]: time="2025-05-13T08:43:10.176003926Z" level=info msg="StopPodSandbox for \"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81\"" May 13 08:43:10.293254 env[1147]: 2025-05-13 08:43:10.240 [WARNING][2940] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"ee4b012b-938a-495d-8e41-e25ae4fa74a1", ResourceVersion:"1475", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 42, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.17", ContainerID:"eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f", Pod:"nginx-deployment-8587fbcb89-rkbvh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.47.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calid181f8f4fd0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:43:10.293254 env[1147]: 2025-05-13 08:43:10.241 [INFO][2940] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" May 13 08:43:10.293254 env[1147]: 2025-05-13 08:43:10.241 [INFO][2940] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" iface="eth0" netns="" May 13 08:43:10.293254 env[1147]: 2025-05-13 08:43:10.241 [INFO][2940] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" May 13 08:43:10.293254 env[1147]: 2025-05-13 08:43:10.241 [INFO][2940] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" May 13 08:43:10.293254 env[1147]: 2025-05-13 08:43:10.272 [INFO][2947] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" HandleID="k8s-pod-network.be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" Workload="172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0" May 13 08:43:10.293254 env[1147]: 2025-05-13 08:43:10.272 [INFO][2947] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:43:10.293254 env[1147]: 2025-05-13 08:43:10.272 [INFO][2947] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:43:10.293254 env[1147]: 2025-05-13 08:43:10.285 [WARNING][2947] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" HandleID="k8s-pod-network.be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" Workload="172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0" May 13 08:43:10.293254 env[1147]: 2025-05-13 08:43:10.285 [INFO][2947] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" HandleID="k8s-pod-network.be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" Workload="172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0" May 13 08:43:10.293254 env[1147]: 2025-05-13 08:43:10.288 [INFO][2947] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:43:10.293254 env[1147]: 2025-05-13 08:43:10.290 [INFO][2940] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" May 13 08:43:10.294352 env[1147]: time="2025-05-13T08:43:10.294293377Z" level=info msg="TearDown network for sandbox \"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81\" successfully" May 13 08:43:10.294489 env[1147]: time="2025-05-13T08:43:10.294455428Z" level=info msg="StopPodSandbox for \"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81\" returns successfully" May 13 08:43:10.295319 env[1147]: time="2025-05-13T08:43:10.295242669Z" level=info msg="RemovePodSandbox for \"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81\"" May 13 08:43:10.295426 env[1147]: time="2025-05-13T08:43:10.295296804Z" level=info msg="Forcibly stopping sandbox \"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81\"" May 13 08:43:10.404592 env[1147]: 2025-05-13 08:43:10.355 [WARNING][2967] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"ee4b012b-938a-495d-8e41-e25ae4fa74a1", ResourceVersion:"1475", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 42, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.17", ContainerID:"eda60fecec7a7f2584ca289965d92ca7e42a5969e6e18916f01ff50dfcae6f6f", Pod:"nginx-deployment-8587fbcb89-rkbvh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.47.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calid181f8f4fd0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:43:10.404592 env[1147]: 2025-05-13 08:43:10.355 [INFO][2967] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" May 13 08:43:10.404592 env[1147]: 2025-05-13 08:43:10.355 [INFO][2967] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" iface="eth0" netns="" May 13 08:43:10.404592 env[1147]: 2025-05-13 08:43:10.356 [INFO][2967] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" May 13 08:43:10.404592 env[1147]: 2025-05-13 08:43:10.356 [INFO][2967] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" May 13 08:43:10.404592 env[1147]: 2025-05-13 08:43:10.382 [INFO][2974] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" HandleID="k8s-pod-network.be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" Workload="172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0" May 13 08:43:10.404592 env[1147]: 2025-05-13 08:43:10.382 [INFO][2974] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:43:10.404592 env[1147]: 2025-05-13 08:43:10.382 [INFO][2974] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:43:10.404592 env[1147]: 2025-05-13 08:43:10.396 [WARNING][2974] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" HandleID="k8s-pod-network.be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" Workload="172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0" May 13 08:43:10.404592 env[1147]: 2025-05-13 08:43:10.396 [INFO][2974] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" HandleID="k8s-pod-network.be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" Workload="172.24.4.17-k8s-nginx--deployment--8587fbcb89--rkbvh-eth0" May 13 08:43:10.404592 env[1147]: 2025-05-13 08:43:10.400 [INFO][2974] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:43:10.404592 env[1147]: 2025-05-13 08:43:10.402 [INFO][2967] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81" May 13 08:43:10.405995 env[1147]: time="2025-05-13T08:43:10.404600604Z" level=info msg="TearDown network for sandbox \"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81\" successfully" May 13 08:43:10.409706 env[1147]: time="2025-05-13T08:43:10.409631332Z" level=info msg="RemovePodSandbox \"be4838093fbd1a66a92176a770d3877c7d5fdba283533f58e629d4d974dfee81\" returns successfully" May 13 08:43:10.816756 kubelet[1454]: E0513 08:43:10.816590 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:11.817952 kubelet[1454]: E0513 08:43:11.817857 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:12.819277 kubelet[1454]: E0513 08:43:12.819069 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:13.820558 kubelet[1454]: E0513 08:43:13.820287 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:14.821179 kubelet[1454]: E0513 08:43:14.821056 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:15.821692 kubelet[1454]: E0513 08:43:15.821568 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:16.822537 kubelet[1454]: E0513 08:43:16.822392 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:17.822976 kubelet[1454]: E0513 08:43:17.822679 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:18.823773 kubelet[1454]: E0513 08:43:18.823549 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:19.824743 kubelet[1454]: E0513 08:43:19.824498 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:20.825325 kubelet[1454]: E0513 08:43:20.825261 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:21.826774 kubelet[1454]: E0513 08:43:21.826655 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:22.827353 kubelet[1454]: E0513 08:43:22.827290 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:23.828979 kubelet[1454]: E0513 08:43:23.828861 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:24.830157 kubelet[1454]: E0513 08:43:24.829976 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:25.831078 kubelet[1454]: E0513 08:43:25.831018 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:26.832089 kubelet[1454]: E0513 08:43:26.831998 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:27.833055 kubelet[1454]: E0513 08:43:27.832928 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:28.833468 kubelet[1454]: E0513 08:43:28.833369 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:29.750336 kubelet[1454]: E0513 08:43:29.750218 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:29.834507 kubelet[1454]: E0513 08:43:29.834432 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:30.836515 kubelet[1454]: E0513 08:43:30.836253 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:31.836692 kubelet[1454]: E0513 08:43:31.836456 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:32.495617 systemd[1]: Created slice kubepods-besteffort-podb7317ad7_dca5_47b9_8a74_9495bf839b54.slice. May 13 08:43:32.618741 kubelet[1454]: I0513 08:43:32.618622 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-857493a8-5741-4961-b9cd-0403024f61af\" (UniqueName: \"kubernetes.io/nfs/b7317ad7-dca5-47b9-8a74-9495bf839b54-pvc-857493a8-5741-4961-b9cd-0403024f61af\") pod \"test-pod-1\" (UID: \"b7317ad7-dca5-47b9-8a74-9495bf839b54\") " pod="default/test-pod-1" May 13 08:43:32.618741 kubelet[1454]: I0513 08:43:32.618712 1454 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lgrrw\" (UniqueName: \"kubernetes.io/projected/b7317ad7-dca5-47b9-8a74-9495bf839b54-kube-api-access-lgrrw\") pod \"test-pod-1\" (UID: \"b7317ad7-dca5-47b9-8a74-9495bf839b54\") " pod="default/test-pod-1" May 13 08:43:32.768206 kernel: Failed to create system directory netfs May 13 08:43:32.768438 kernel: kauditd_printk_skb: 68 callbacks suppressed May 13 08:43:32.768486 kernel: audit: type=1400 audit(1747125812.763:721): avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.763000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.776208 kernel: Failed to create system directory netfs May 13 08:43:32.776282 kernel: audit: type=1400 audit(1747125812.763:721): avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.763000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.783991 kernel: Failed to create system directory netfs May 13 08:43:32.784564 kernel: audit: type=1400 audit(1747125812.763:721): avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.763000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.791811 kernel: Failed to create system directory netfs May 13 08:43:32.791881 kernel: audit: type=1400 audit(1747125812.763:721): avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.763000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.763000 audit[3012]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562bb74b25e0 a1=153bc a2=562b86dd02b0 a3=5 items=0 ppid=1680 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:32.763000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 08:43:32.816958 kernel: audit: type=1300 audit(1747125812.763:721): arch=c000003e syscall=175 success=yes exit=0 a0=562bb74b25e0 a1=153bc a2=562b86dd02b0 a3=5 items=0 ppid=1680 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:32.817032 kernel: audit: type=1327 audit(1747125812.763:721): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 08:43:32.830355 kernel: Failed to create system directory fscache May 13 08:43:32.830445 kernel: audit: type=1400 audit(1747125812.819:722): avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.830489 kernel: Failed to create system directory fscache May 13 08:43:32.819000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.837039 kernel: audit: type=1400 audit(1747125812.819:722): avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.837093 kernel: Failed to create system directory fscache May 13 08:43:32.819000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.837286 kubelet[1454]: E0513 08:43:32.837247 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:32.843539 kernel: audit: type=1400 audit(1747125812.819:722): avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.843591 kernel: Failed to create system directory fscache May 13 08:43:32.819000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.849905 kernel: audit: type=1400 audit(1747125812.819:722): avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.849965 kernel: Failed to create system directory fscache May 13 08:43:32.819000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.819000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.819000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.852691 kernel: Failed to create system directory fscache May 13 08:43:32.852737 kernel: Failed to create system directory fscache May 13 08:43:32.819000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.854139 kernel: Failed to create system directory fscache May 13 08:43:32.819000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.819000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.860440 kernel: Failed to create system directory fscache May 13 08:43:32.860509 kernel: Failed to create system directory fscache May 13 08:43:32.819000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.819000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.862989 kernel: Failed to create system directory fscache May 13 08:43:32.863029 kernel: Failed to create system directory fscache May 13 08:43:32.819000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.819000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.865663 kernel: Failed to create system directory fscache May 13 08:43:32.865715 kernel: Failed to create system directory fscache May 13 08:43:32.819000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.819000 audit[3012]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562bb76c79c0 a1=4c0fc a2=562b86dd02b0 a3=5 items=0 ppid=1680 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:32.819000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 08:43:32.869147 kernel: FS-Cache: Loaded May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.918188 kernel: Failed to create system directory sunrpc May 13 08:43:32.918331 kernel: Failed to create system directory sunrpc May 13 08:43:32.918405 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.921372 kernel: Failed to create system directory sunrpc May 13 08:43:32.921522 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.924395 kernel: Failed to create system directory sunrpc May 13 08:43:32.924526 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.927182 kernel: Failed to create system directory sunrpc May 13 08:43:32.927317 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.930073 kernel: Failed to create system directory sunrpc May 13 08:43:32.930233 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.932957 kernel: Failed to create system directory sunrpc May 13 08:43:32.933027 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.935976 kernel: Failed to create system directory sunrpc May 13 08:43:32.936087 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.938729 kernel: Failed to create system directory sunrpc May 13 08:43:32.938807 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.941521 kernel: Failed to create system directory sunrpc May 13 08:43:32.941641 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.944101 kernel: Failed to create system directory sunrpc May 13 08:43:32.944244 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.946692 kernel: Failed to create system directory sunrpc May 13 08:43:32.946814 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.949441 kernel: Failed to create system directory sunrpc May 13 08:43:32.949520 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.952197 kernel: Failed to create system directory sunrpc May 13 08:43:32.952315 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.954812 kernel: Failed to create system directory sunrpc May 13 08:43:32.954935 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.957440 kernel: Failed to create system directory sunrpc May 13 08:43:32.957529 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.960045 kernel: Failed to create system directory sunrpc May 13 08:43:32.960160 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.963068 kernel: Failed to create system directory sunrpc May 13 08:43:32.963239 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.965912 kernel: Failed to create system directory sunrpc May 13 08:43:32.966041 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.968534 kernel: Failed to create system directory sunrpc May 13 08:43:32.968602 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.971398 kernel: Failed to create system directory sunrpc May 13 08:43:32.971518 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.974166 kernel: Failed to create system directory sunrpc May 13 08:43:32.974262 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.976894 kernel: Failed to create system directory sunrpc May 13 08:43:32.976991 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.978236 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.980739 kernel: Failed to create system directory sunrpc May 13 08:43:32.980885 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.983436 kernel: Failed to create system directory sunrpc May 13 08:43:32.983559 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.986306 kernel: Failed to create system directory sunrpc May 13 08:43:32.986427 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.987741 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.989191 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.991846 kernel: Failed to create system directory sunrpc May 13 08:43:32.991971 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.994479 kernel: Failed to create system directory sunrpc May 13 08:43:32.994616 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.997073 kernel: Failed to create system directory sunrpc May 13 08:43:32.997198 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.998333 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.999727 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.002506 kernel: Failed to create system directory sunrpc May 13 08:43:33.002643 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.005192 kernel: Failed to create system directory sunrpc May 13 08:43:33.005314 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.007836 kernel: Failed to create system directory sunrpc May 13 08:43:33.007972 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.010394 kernel: Failed to create system directory sunrpc May 13 08:43:33.010514 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.013173 kernel: Failed to create system directory sunrpc May 13 08:43:33.013298 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.015810 kernel: Failed to create system directory sunrpc May 13 08:43:33.015949 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.018843 kernel: Failed to create system directory sunrpc May 13 08:43:33.018964 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.025674 kernel: Failed to create system directory sunrpc May 13 08:43:33.025802 kernel: Failed to create system directory sunrpc May 13 08:43:33.025864 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.028245 kernel: Failed to create system directory sunrpc May 13 08:43:33.028370 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.029409 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.030961 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.032226 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.034737 kernel: Failed to create system directory sunrpc May 13 08:43:33.034881 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.036071 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.037492 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.040616 kernel: Failed to create system directory sunrpc May 13 08:43:33.040769 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.041862 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.043406 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.046356 kernel: Failed to create system directory sunrpc May 13 08:43:33.046490 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.047682 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.053032 kernel: Failed to create system directory sunrpc May 13 08:43:33.053086 kernel: Failed to create system directory sunrpc May 13 08:43:33.053193 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.056479 kernel: Failed to create system directory sunrpc May 13 08:43:33.056592 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.059570 kernel: Failed to create system directory sunrpc May 13 08:43:33.059694 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.064774 kernel: Failed to create system directory sunrpc May 13 08:43:33.064873 kernel: Failed to create system directory sunrpc May 13 08:43:33.064912 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.068140 kernel: Failed to create system directory sunrpc May 13 08:43:33.068231 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.085649 kernel: Failed to create system directory sunrpc May 13 08:43:33.085810 kernel: Failed to create system directory sunrpc May 13 08:43:33.085892 kernel: Failed to create system directory sunrpc May 13 08:43:33.085940 kernel: Failed to create system directory sunrpc May 13 08:43:33.085974 kernel: Failed to create system directory sunrpc May 13 08:43:33.086012 kernel: Failed to create system directory sunrpc May 13 08:43:33.086058 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.087061 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.089940 kernel: Failed to create system directory sunrpc May 13 08:43:33.089994 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.091588 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.092892 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.094342 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.095699 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.097108 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.101314 kernel: Failed to create system directory sunrpc May 13 08:43:33.101431 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.104410 kernel: Failed to create system directory sunrpc May 13 08:43:33.104466 kernel: Failed to create system directory sunrpc May 13 08:43:32.897000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.118870 kernel: RPC: Registered named UNIX socket transport module. May 13 08:43:33.118945 kernel: RPC: Registered udp transport module. May 13 08:43:33.119012 kernel: RPC: Registered tcp transport module. May 13 08:43:33.120449 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 13 08:43:32.897000 audit[3012]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562bb7713ad0 a1=1a814c a2=562b86dd02b0 a3=5 items=6 ppid=1680 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:32.897000 audit: CWD cwd="/" May 13 08:43:32.897000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:43:32.897000 audit: PATH item=1 name=(null) inode=22194 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:43:32.897000 audit: PATH item=2 name=(null) inode=22194 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:43:32.897000 audit: PATH item=3 name=(null) inode=22195 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:43:32.897000 audit: PATH item=4 name=(null) inode=22194 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:43:32.897000 audit: PATH item=5 name=(null) inode=22196 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 13 08:43:32.897000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.204898 kernel: Failed to create system directory nfs May 13 08:43:33.204977 kernel: Failed to create system directory nfs May 13 08:43:33.205011 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.207560 kernel: Failed to create system directory nfs May 13 08:43:33.207614 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.210882 kernel: Failed to create system directory nfs May 13 08:43:33.210979 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.213754 kernel: Failed to create system directory nfs May 13 08:43:33.213818 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.216650 kernel: Failed to create system directory nfs May 13 08:43:33.216715 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.219602 kernel: Failed to create system directory nfs May 13 08:43:33.219654 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.223761 kernel: Failed to create system directory nfs May 13 08:43:33.223821 kernel: Failed to create system directory nfs May 13 08:43:33.223863 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.226459 kernel: Failed to create system directory nfs May 13 08:43:33.226522 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.229045 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.231110 kernel: Failed to create system directory nfs May 13 08:43:33.231220 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.234137 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.235771 kernel: Failed to create system directory nfs May 13 08:43:33.235855 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.238547 kernel: Failed to create system directory nfs May 13 08:43:33.238626 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.241508 kernel: Failed to create system directory nfs May 13 08:43:33.241588 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.244364 kernel: Failed to create system directory nfs May 13 08:43:33.244452 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.247375 kernel: Failed to create system directory nfs May 13 08:43:33.247452 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.250229 kernel: Failed to create system directory nfs May 13 08:43:33.250308 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.253158 kernel: Failed to create system directory nfs May 13 08:43:33.253209 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.256030 kernel: Failed to create system directory nfs May 13 08:43:33.256080 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.259568 kernel: Failed to create system directory nfs May 13 08:43:33.259634 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.261226 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.264101 kernel: Failed to create system directory nfs May 13 08:43:33.264178 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.271179 kernel: Failed to create system directory nfs May 13 08:43:33.271281 kernel: Failed to create system directory nfs May 13 08:43:33.278361 kernel: Failed to create system directory nfs May 13 08:43:33.278494 kernel: Failed to create system directory nfs May 13 08:43:33.278558 kernel: Failed to create system directory nfs May 13 08:43:33.278601 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.280197 kernel: Failed to create system directory nfs May 13 08:43:33.280278 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.282785 kernel: Failed to create system directory nfs May 13 08:43:33.282873 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.284047 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.285264 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.286487 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.287738 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.289059 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.290271 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.291498 kernel: Failed to create system directory nfs May 13 08:43:33.185000 audit[3012]: AVC avc: denied { confidentiality } for pid=3012 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.320216 kernel: FS-Cache: Netfs 'nfs' registered for caching May 13 08:43:33.185000 audit[3012]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562bb7934a10 a1=16eae4 a2=562b86dd02b0 a3=5 items=0 ppid=1680 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:33.185000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.373745 kernel: Failed to create system directory nfs4 May 13 08:43:33.373845 kernel: Failed to create system directory nfs4 May 13 08:43:33.373927 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.375009 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.376264 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.377560 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.378788 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.380029 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.381279 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.382490 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.385230 kernel: Failed to create system directory nfs4 May 13 08:43:33.385333 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.386431 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.387684 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.388833 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.390105 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.391287 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.392630 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.393801 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.395145 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.397664 kernel: Failed to create system directory nfs4 May 13 08:43:33.397818 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.398832 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.400209 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.401349 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.402667 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.403912 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.405204 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.406346 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.407690 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.408840 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.410177 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.411349 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.412681 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.413817 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.415052 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.416262 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.418708 kernel: Failed to create system directory nfs4 May 13 08:43:33.418856 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.419926 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.421469 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.422518 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.423709 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.425045 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.427544 kernel: Failed to create system directory nfs4 May 13 08:43:33.427675 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.428671 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.430011 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.431300 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.433803 kernel: Failed to create system directory nfs4 May 13 08:43:33.433977 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.434970 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.436350 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.437505 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.438693 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.439990 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.441168 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.442479 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.443831 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.445053 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.446261 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.448654 kernel: Failed to create system directory nfs4 May 13 08:43:33.448784 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.449901 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.451183 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.452411 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.453676 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.454899 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.456079 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.457284 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.459679 kernel: Failed to create system directory nfs4 May 13 08:43:33.459826 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.460914 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.462209 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.463302 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.464648 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.465818 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.466996 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.468345 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.469591 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.470846 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.472061 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.473243 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.474579 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.475758 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.477076 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.478254 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.479594 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.480758 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.482079 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.483258 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.484605 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.485770 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.487103 kernel: Failed to create system directory nfs4 May 13 08:43:33.354000 audit[3017]: AVC avc: denied { confidentiality } for pid=3017 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.655781 kernel: NFS: Registering the id_resolver key type May 13 08:43:33.656306 kernel: Key type id_resolver registered May 13 08:43:33.656371 kernel: Key type id_legacy registered May 13 08:43:33.354000 audit[3017]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f6287f94010 a1=209404 a2=55e4dc1fe2b0 a3=5 items=0 ppid=1680 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:33.354000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.682336 kernel: Failed to create system directory rpcgss May 13 08:43:33.682387 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.683742 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.685151 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.686527 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.687911 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.689292 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.690684 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.692109 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.694736 kernel: Failed to create system directory rpcgss May 13 08:43:33.694770 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.696137 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.697579 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.698978 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.700394 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.701801 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.703214 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.704684 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.706123 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.707523 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.708900 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.710309 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.711732 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.713164 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.714568 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.715956 kernel: Failed to create system directory rpcgss May 13 08:43:33.675000 audit[3018]: AVC avc: denied { confidentiality } for pid=3018 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 13 08:43:33.675000 audit[3018]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f6453e92010 a1=70b64 a2=56139773b2b0 a3=5 items=0 ppid=1680 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:33.675000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 13 08:43:33.764226 nfsidmap[3024]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' May 13 08:43:33.772430 nfsidmap[3025]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' May 13 08:43:33.785000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2556 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 08:43:33.786000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2556 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 08:43:33.786000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2556 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 08:43:33.789000 audit[1224]: AVC avc: denied { watch_reads } for pid=1224 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2556 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 08:43:33.789000 audit[1224]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561a72cd7a70 a2=10 a3=42354f79de5ad5b1 items=0 ppid=1 pid=1224 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:33.789000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 13 08:43:33.789000 audit[1224]: AVC avc: denied { watch_reads } for pid=1224 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2556 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 08:43:33.789000 audit[1224]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561a72cd7a70 a2=10 a3=42354f79de5ad5b1 items=0 ppid=1 pid=1224 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:33.789000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 13 08:43:33.789000 audit[1224]: AVC avc: denied { watch_reads } for pid=1224 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2556 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 13 08:43:33.789000 audit[1224]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561a72cd7a70 a2=10 a3=42354f79de5ad5b1 items=0 ppid=1 pid=1224 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:33.789000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 13 08:43:33.837856 kubelet[1454]: E0513 08:43:33.837763 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:34.003972 env[1147]: time="2025-05-13T08:43:34.003629330Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:b7317ad7-dca5-47b9-8a74-9495bf839b54,Namespace:default,Attempt:0,}" May 13 08:43:34.336209 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 13 08:43:34.336626 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 13 08:43:34.337078 systemd-networkd[991]: cali5ec59c6bf6e: Link UP May 13 08:43:34.341268 systemd-networkd[991]: cali5ec59c6bf6e: Gained carrier May 13 08:43:34.386071 env[1147]: 2025-05-13 08:43:34.145 [INFO][3026] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.17-k8s-test--pod--1-eth0 default b7317ad7-dca5-47b9-8a74-9495bf839b54 1622 0 2025-05-13 08:43:00 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.17 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.17-k8s-test--pod--1-" May 13 08:43:34.386071 env[1147]: 2025-05-13 08:43:34.145 [INFO][3026] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.17-k8s-test--pod--1-eth0" May 13 08:43:34.386071 env[1147]: 2025-05-13 08:43:34.213 [INFO][3038] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a" HandleID="k8s-pod-network.08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a" Workload="172.24.4.17-k8s-test--pod--1-eth0" May 13 08:43:34.386071 env[1147]: 2025-05-13 08:43:34.240 [INFO][3038] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a" HandleID="k8s-pod-network.08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a" Workload="172.24.4.17-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000336ba0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.17", "pod":"test-pod-1", "timestamp":"2025-05-13 08:43:34.213380763 +0000 UTC"}, Hostname:"172.24.4.17", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 13 08:43:34.386071 env[1147]: 2025-05-13 08:43:34.240 [INFO][3038] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 13 08:43:34.386071 env[1147]: 2025-05-13 08:43:34.241 [INFO][3038] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 13 08:43:34.386071 env[1147]: 2025-05-13 08:43:34.241 [INFO][3038] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.17' May 13 08:43:34.386071 env[1147]: 2025-05-13 08:43:34.246 [INFO][3038] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a" host="172.24.4.17" May 13 08:43:34.386071 env[1147]: 2025-05-13 08:43:34.256 [INFO][3038] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.17" May 13 08:43:34.386071 env[1147]: 2025-05-13 08:43:34.267 [INFO][3038] ipam/ipam.go 489: Trying affinity for 192.168.47.128/26 host="172.24.4.17" May 13 08:43:34.386071 env[1147]: 2025-05-13 08:43:34.273 [INFO][3038] ipam/ipam.go 155: Attempting to load block cidr=192.168.47.128/26 host="172.24.4.17" May 13 08:43:34.386071 env[1147]: 2025-05-13 08:43:34.279 [INFO][3038] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.47.128/26 host="172.24.4.17" May 13 08:43:34.386071 env[1147]: 2025-05-13 08:43:34.279 [INFO][3038] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.47.128/26 handle="k8s-pod-network.08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a" host="172.24.4.17" May 13 08:43:34.386071 env[1147]: 2025-05-13 08:43:34.284 [INFO][3038] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a May 13 08:43:34.386071 env[1147]: 2025-05-13 08:43:34.293 [INFO][3038] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.47.128/26 handle="k8s-pod-network.08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a" host="172.24.4.17" May 13 08:43:34.386071 env[1147]: 2025-05-13 08:43:34.308 [INFO][3038] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.47.132/26] block=192.168.47.128/26 handle="k8s-pod-network.08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a" host="172.24.4.17" May 13 08:43:34.386071 env[1147]: 2025-05-13 08:43:34.309 [INFO][3038] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.47.132/26] handle="k8s-pod-network.08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a" host="172.24.4.17" May 13 08:43:34.386071 env[1147]: 2025-05-13 08:43:34.309 [INFO][3038] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 13 08:43:34.386071 env[1147]: 2025-05-13 08:43:34.309 [INFO][3038] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.47.132/26] IPv6=[] ContainerID="08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a" HandleID="k8s-pod-network.08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a" Workload="172.24.4.17-k8s-test--pod--1-eth0" May 13 08:43:34.386071 env[1147]: 2025-05-13 08:43:34.312 [INFO][3026] cni-plugin/k8s.go 386: Populated endpoint ContainerID="08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.17-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.17-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"b7317ad7-dca5-47b9-8a74-9495bf839b54", ResourceVersion:"1622", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 43, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.17", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.47.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:43:34.388740 env[1147]: 2025-05-13 08:43:34.312 [INFO][3026] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.47.132/32] ContainerID="08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.17-k8s-test--pod--1-eth0" May 13 08:43:34.388740 env[1147]: 2025-05-13 08:43:34.312 [INFO][3026] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.17-k8s-test--pod--1-eth0" May 13 08:43:34.388740 env[1147]: 2025-05-13 08:43:34.339 [INFO][3026] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.17-k8s-test--pod--1-eth0" May 13 08:43:34.388740 env[1147]: 2025-05-13 08:43:34.347 [INFO][3026] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.17-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.17-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"b7317ad7-dca5-47b9-8a74-9495bf839b54", ResourceVersion:"1622", Generation:0, CreationTimestamp:time.Date(2025, time.May, 13, 8, 43, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.17", ContainerID:"08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.47.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"c2:b3:86:63:bf:eb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 13 08:43:34.388740 env[1147]: 2025-05-13 08:43:34.371 [INFO][3026] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.17-k8s-test--pod--1-eth0" May 13 08:43:34.412000 audit[3058]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3058 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 13 08:43:34.412000 audit[3058]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffe5b7f7c80 a2=0 a3=7ffe5b7f7c6c items=0 ppid=2155 pid=3058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:34.412000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 13 08:43:34.424734 env[1147]: time="2025-05-13T08:43:34.424282021Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 13 08:43:34.424734 env[1147]: time="2025-05-13T08:43:34.424364728Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 13 08:43:34.424734 env[1147]: time="2025-05-13T08:43:34.424381419Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 13 08:43:34.424734 env[1147]: time="2025-05-13T08:43:34.424613200Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a pid=3065 runtime=io.containerd.runc.v2 May 13 08:43:34.444208 systemd[1]: Started cri-containerd-08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a.scope. May 13 08:43:34.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.458000 audit: BPF prog-id=120 op=LOAD May 13 08:43:34.459000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.459000 audit[3076]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3065 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:34.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038633334383236373963666333313462316134343937616665393735 May 13 08:43:34.459000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.459000 audit[3076]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3065 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:34.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038633334383236373963666333313462316134343937616665393735 May 13 08:43:34.459000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.459000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.459000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.459000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.459000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.459000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.459000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.459000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.459000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.459000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.459000 audit: BPF prog-id=121 op=LOAD May 13 08:43:34.459000 audit[3076]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000271ce0 items=0 ppid=3065 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:34.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038633334383236373963666333313462316134343937616665393735 May 13 08:43:34.460000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.460000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.460000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.460000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.460000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.460000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.460000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.460000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.460000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.460000 audit: BPF prog-id=122 op=LOAD May 13 08:43:34.460000 audit[3076]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000271d28 items=0 ppid=3065 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:34.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038633334383236373963666333313462316134343937616665393735 May 13 08:43:34.461000 audit: BPF prog-id=122 op=UNLOAD May 13 08:43:34.461000 audit: BPF prog-id=121 op=UNLOAD May 13 08:43:34.461000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.461000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.461000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.461000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.461000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.461000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.461000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.461000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.461000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.461000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:34.461000 audit: BPF prog-id=123 op=LOAD May 13 08:43:34.461000 audit[3076]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00037a138 items=0 ppid=3065 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:34.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038633334383236373963666333313462316134343937616665393735 May 13 08:43:34.491058 env[1147]: time="2025-05-13T08:43:34.491003023Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:b7317ad7-dca5-47b9-8a74-9495bf839b54,Namespace:default,Attempt:0,} returns sandbox id \"08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a\"" May 13 08:43:34.493061 env[1147]: time="2025-05-13T08:43:34.493021806Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 13 08:43:34.838417 kubelet[1454]: E0513 08:43:34.838283 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:34.979405 env[1147]: time="2025-05-13T08:43:34.979283749Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:43:34.982972 env[1147]: time="2025-05-13T08:43:34.982894817Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:43:34.987544 env[1147]: time="2025-05-13T08:43:34.987479663Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:43:34.992014 env[1147]: time="2025-05-13T08:43:34.991957356Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 13 08:43:34.994266 env[1147]: time="2025-05-13T08:43:34.994111115Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 13 08:43:35.001582 env[1147]: time="2025-05-13T08:43:35.001519924Z" level=info msg="CreateContainer within sandbox \"08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 13 08:43:35.029965 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2457749084.mount: Deactivated successfully. May 13 08:43:35.048411 env[1147]: time="2025-05-13T08:43:35.048334277Z" level=info msg="CreateContainer within sandbox \"08c3482679cfc314b1a4497afe975f0b734099750c2295960554bb8c8765652a\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"49f882c1e92a73be98e96a94822e9e7ad9e86d9fa39a4741cd1787a7d9ddf25b\"" May 13 08:43:35.050659 env[1147]: time="2025-05-13T08:43:35.050572306Z" level=info msg="StartContainer for \"49f882c1e92a73be98e96a94822e9e7ad9e86d9fa39a4741cd1787a7d9ddf25b\"" May 13 08:43:35.102978 systemd[1]: Started cri-containerd-49f882c1e92a73be98e96a94822e9e7ad9e86d9fa39a4741cd1787a7d9ddf25b.scope. May 13 08:43:35.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.128000 audit: BPF prog-id=124 op=LOAD May 13 08:43:35.129000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.129000 audit[3110]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3065 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:35.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439663838326331653932613733626539386539366139343832326539 May 13 08:43:35.129000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.129000 audit[3110]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3065 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:35.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439663838326331653932613733626539386539366139343832326539 May 13 08:43:35.129000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.129000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.129000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.129000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.129000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.129000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.129000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.129000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.129000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.129000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.129000 audit: BPF prog-id=125 op=LOAD May 13 08:43:35.129000 audit[3110]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000261ed0 items=0 ppid=3065 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:35.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439663838326331653932613733626539386539366139343832326539 May 13 08:43:35.130000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.130000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.130000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.130000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.130000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.130000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.130000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.130000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.130000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.130000 audit: BPF prog-id=126 op=LOAD May 13 08:43:35.130000 audit[3110]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000261f18 items=0 ppid=3065 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:35.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439663838326331653932613733626539386539366139343832326539 May 13 08:43:35.130000 audit: BPF prog-id=126 op=UNLOAD May 13 08:43:35.130000 audit: BPF prog-id=125 op=UNLOAD May 13 08:43:35.131000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.131000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.131000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.131000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.131000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.131000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.131000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.131000 audit[3110]: AVC avc: denied { perfmon } for pid=3110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.131000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.131000 audit[3110]: AVC avc: denied { bpf } for pid=3110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 13 08:43:35.131000 audit: BPF prog-id=127 op=LOAD May 13 08:43:35.131000 audit[3110]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003bc328 items=0 ppid=3065 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 13 08:43:35.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439663838326331653932613733626539386539366139343832326539 May 13 08:43:35.155800 env[1147]: time="2025-05-13T08:43:35.155752672Z" level=info msg="StartContainer for \"49f882c1e92a73be98e96a94822e9e7ad9e86d9fa39a4741cd1787a7d9ddf25b\" returns successfully" May 13 08:43:35.547386 kubelet[1454]: I0513 08:43:35.547245 1454 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=35.041810557 podStartE2EDuration="35.547211563s" podCreationTimestamp="2025-05-13 08:43:00 +0000 UTC" firstStartedPulling="2025-05-13 08:43:34.492446535 +0000 UTC m=+85.447045019" lastFinishedPulling="2025-05-13 08:43:34.997847501 +0000 UTC m=+85.952446025" observedRunningTime="2025-05-13 08:43:35.54688369 +0000 UTC m=+86.501482224" watchObservedRunningTime="2025-05-13 08:43:35.547211563 +0000 UTC m=+86.501810087" May 13 08:43:35.838979 kubelet[1454]: E0513 08:43:35.838839 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:36.063220 systemd-networkd[991]: cali5ec59c6bf6e: Gained IPv6LL May 13 08:43:36.102355 systemd[1]: run-containerd-runc-k8s.io-35137ec69b9f248c6813546cc8a9025842e2f351749f4488f7dffffa52c1e622-runc.icwzsp.mount: Deactivated successfully. May 13 08:43:36.840367 kubelet[1454]: E0513 08:43:36.840293 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:37.841884 kubelet[1454]: E0513 08:43:37.841780 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:38.842533 kubelet[1454]: E0513 08:43:38.842378 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:39.843239 kubelet[1454]: E0513 08:43:39.843100 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:40.844031 kubelet[1454]: E0513 08:43:40.843949 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:41.845331 kubelet[1454]: E0513 08:43:41.845034 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:42.845924 kubelet[1454]: E0513 08:43:42.845809 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:43.848159 kubelet[1454]: E0513 08:43:43.848000 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:44.848358 kubelet[1454]: E0513 08:43:44.848231 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:45.849331 kubelet[1454]: E0513 08:43:45.849243 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:46.850177 kubelet[1454]: E0513 08:43:46.850065 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:47.850961 kubelet[1454]: E0513 08:43:47.850863 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:48.852700 kubelet[1454]: E0513 08:43:48.852624 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:49.750979 kubelet[1454]: E0513 08:43:49.750911 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:49.853982 kubelet[1454]: E0513 08:43:49.853914 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:50.855741 kubelet[1454]: E0513 08:43:50.855538 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:51.857070 kubelet[1454]: E0513 08:43:51.856932 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:52.858537 kubelet[1454]: E0513 08:43:52.858443 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:53.859744 kubelet[1454]: E0513 08:43:53.859572 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:54.860943 kubelet[1454]: E0513 08:43:54.860876 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:55.862699 kubelet[1454]: E0513 08:43:55.862626 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:56.863935 kubelet[1454]: E0513 08:43:56.863863 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:57.865707 kubelet[1454]: E0513 08:43:57.865634 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:58.867637 kubelet[1454]: E0513 08:43:58.867504 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:43:59.869523 kubelet[1454]: E0513 08:43:59.869330 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:00.871359 kubelet[1454]: E0513 08:44:00.871269 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:01.873400 kubelet[1454]: E0513 08:44:01.873250 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:02.873969 kubelet[1454]: E0513 08:44:02.873821 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:03.875983 kubelet[1454]: E0513 08:44:03.875877 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:04.877725 kubelet[1454]: E0513 08:44:04.877660 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:05.878168 kubelet[1454]: E0513 08:44:05.877975 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:06.146862 systemd[1]: run-containerd-runc-k8s.io-35137ec69b9f248c6813546cc8a9025842e2f351749f4488f7dffffa52c1e622-runc.k0w45u.mount: Deactivated successfully. May 13 08:44:06.879317 kubelet[1454]: E0513 08:44:06.879046 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:07.880161 kubelet[1454]: E0513 08:44:07.880050 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:08.881022 kubelet[1454]: E0513 08:44:08.880974 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:09.751456 kubelet[1454]: E0513 08:44:09.751322 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:09.882023 kubelet[1454]: E0513 08:44:09.881899 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:10.882625 kubelet[1454]: E0513 08:44:10.882521 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:11.883907 kubelet[1454]: E0513 08:44:11.883482 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:12.884295 kubelet[1454]: E0513 08:44:12.884232 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:13.886307 kubelet[1454]: E0513 08:44:13.886180 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:14.886789 kubelet[1454]: E0513 08:44:14.886688 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:15.887042 kubelet[1454]: E0513 08:44:15.886901 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:16.887300 kubelet[1454]: E0513 08:44:16.887210 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:17.888847 kubelet[1454]: E0513 08:44:17.888753 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:18.889531 kubelet[1454]: E0513 08:44:18.889326 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:19.889790 kubelet[1454]: E0513 08:44:19.889657 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:20.890802 kubelet[1454]: E0513 08:44:20.890721 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:21.891258 kubelet[1454]: E0513 08:44:21.891188 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:22.893376 kubelet[1454]: E0513 08:44:22.893270 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:23.894517 kubelet[1454]: E0513 08:44:23.894408 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:24.895192 kubelet[1454]: E0513 08:44:24.895052 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:25.896012 kubelet[1454]: E0513 08:44:25.895889 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:26.897229 kubelet[1454]: E0513 08:44:26.897073 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:27.898403 kubelet[1454]: E0513 08:44:27.897941 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:28.899341 kubelet[1454]: E0513 08:44:28.899273 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:29.751325 kubelet[1454]: E0513 08:44:29.751204 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:29.900777 kubelet[1454]: E0513 08:44:29.900658 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:30.901334 kubelet[1454]: E0513 08:44:30.901269 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:31.902559 kubelet[1454]: E0513 08:44:31.902475 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:32.904243 kubelet[1454]: E0513 08:44:32.904182 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:33.906271 kubelet[1454]: E0513 08:44:33.906208 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:34.908984 kubelet[1454]: E0513 08:44:34.908867 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:35.909200 kubelet[1454]: E0513 08:44:35.909093 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:36.093027 systemd[1]: run-containerd-runc-k8s.io-35137ec69b9f248c6813546cc8a9025842e2f351749f4488f7dffffa52c1e622-runc.S9HbXr.mount: Deactivated successfully. May 13 08:44:36.911059 kubelet[1454]: E0513 08:44:36.910955 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:37.912371 kubelet[1454]: E0513 08:44:37.912222 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:38.913464 kubelet[1454]: E0513 08:44:38.913350 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:39.913885 kubelet[1454]: E0513 08:44:39.913820 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:40.916342 kubelet[1454]: E0513 08:44:40.916272 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:41.917835 kubelet[1454]: E0513 08:44:41.917694 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:42.918567 kubelet[1454]: E0513 08:44:42.918493 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:43.920382 kubelet[1454]: E0513 08:44:43.920306 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:44.921650 kubelet[1454]: E0513 08:44:44.921586 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:45.923467 kubelet[1454]: E0513 08:44:45.923390 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:46.923917 kubelet[1454]: E0513 08:44:46.923855 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:47.925892 kubelet[1454]: E0513 08:44:47.925735 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:48.926522 kubelet[1454]: E0513 08:44:48.926452 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:49.750467 kubelet[1454]: E0513 08:44:49.750399 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:49.928197 kubelet[1454]: E0513 08:44:49.928004 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:50.930176 kubelet[1454]: E0513 08:44:50.930026 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:51.931026 kubelet[1454]: E0513 08:44:51.930960 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:52.932668 kubelet[1454]: E0513 08:44:52.932594 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:53.934462 kubelet[1454]: E0513 08:44:53.934347 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:54.935986 kubelet[1454]: E0513 08:44:54.935841 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:55.936967 kubelet[1454]: E0513 08:44:55.936803 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:56.937497 kubelet[1454]: E0513 08:44:56.937356 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:57.938702 kubelet[1454]: E0513 08:44:57.938586 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:58.940007 kubelet[1454]: E0513 08:44:58.939863 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:44:59.941245 kubelet[1454]: E0513 08:44:59.941176 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:00.943220 kubelet[1454]: E0513 08:45:00.943060 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:01.943675 kubelet[1454]: E0513 08:45:01.943580 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:02.944447 kubelet[1454]: E0513 08:45:02.944367 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:03.945979 kubelet[1454]: E0513 08:45:03.945907 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:04.947811 kubelet[1454]: E0513 08:45:04.947748 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:05.949937 kubelet[1454]: E0513 08:45:05.949866 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:06.146976 systemd[1]: run-containerd-runc-k8s.io-35137ec69b9f248c6813546cc8a9025842e2f351749f4488f7dffffa52c1e622-runc.OETBxv.mount: Deactivated successfully. May 13 08:45:06.951053 kubelet[1454]: E0513 08:45:06.950783 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:07.951839 kubelet[1454]: E0513 08:45:07.951769 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:08.953222 kubelet[1454]: E0513 08:45:08.953159 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:09.751208 kubelet[1454]: E0513 08:45:09.751092 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:09.954414 kubelet[1454]: E0513 08:45:09.954299 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:10.955576 kubelet[1454]: E0513 08:45:10.955465 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:11.956809 kubelet[1454]: E0513 08:45:11.956735 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:12.957465 kubelet[1454]: E0513 08:45:12.957364 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:13.958708 kubelet[1454]: E0513 08:45:13.958401 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:14.959744 kubelet[1454]: E0513 08:45:14.959674 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:15.960697 kubelet[1454]: E0513 08:45:15.960604 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:16.961514 kubelet[1454]: E0513 08:45:16.961410 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:17.961933 kubelet[1454]: E0513 08:45:17.961838 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:18.962166 kubelet[1454]: E0513 08:45:18.962043 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:19.962794 kubelet[1454]: E0513 08:45:19.962742 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:20.964824 kubelet[1454]: E0513 08:45:20.964626 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:21.965777 kubelet[1454]: E0513 08:45:21.965624 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:22.965928 kubelet[1454]: E0513 08:45:22.965853 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:23.967008 kubelet[1454]: E0513 08:45:23.966946 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:24.969191 kubelet[1454]: E0513 08:45:24.969098 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:25.971843 kubelet[1454]: E0513 08:45:25.971673 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:26.974379 kubelet[1454]: E0513 08:45:26.974259 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:27.975912 kubelet[1454]: E0513 08:45:27.975808 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:28.976714 kubelet[1454]: E0513 08:45:28.976448 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:29.751164 kubelet[1454]: E0513 08:45:29.750982 1454 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:29.977473 kubelet[1454]: E0513 08:45:29.977341 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:30.977863 kubelet[1454]: E0513 08:45:30.977641 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:31.978729 kubelet[1454]: E0513 08:45:31.978541 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:32.979738 kubelet[1454]: E0513 08:45:32.979671 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:33.981299 kubelet[1454]: E0513 08:45:33.981178 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:34.981513 kubelet[1454]: E0513 08:45:34.981417 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:35.982739 kubelet[1454]: E0513 08:45:35.982604 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:36.103562 systemd[1]: run-containerd-runc-k8s.io-35137ec69b9f248c6813546cc8a9025842e2f351749f4488f7dffffa52c1e622-runc.ARn19n.mount: Deactivated successfully. May 13 08:45:36.983580 kubelet[1454]: E0513 08:45:36.983491 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:37.984518 kubelet[1454]: E0513 08:45:37.984426 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:38.986304 kubelet[1454]: E0513 08:45:38.986230 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:39.987337 kubelet[1454]: E0513 08:45:39.987270 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:40.987979 kubelet[1454]: E0513 08:45:40.987916 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:41.989897 kubelet[1454]: E0513 08:45:41.989769 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:42.990973 kubelet[1454]: E0513 08:45:42.990857 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:43.991492 kubelet[1454]: E0513 08:45:43.991381 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:44.992335 kubelet[1454]: E0513 08:45:44.992215 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:45.992666 kubelet[1454]: E0513 08:45:45.992526 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 13 08:45:46.993515 kubelet[1454]: E0513 08:45:46.993408 1454 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"